Automate Auxiliary Module in Metasploit
☆17Apr 18, 2021Updated 4 years ago
Alternatives and similar repositories for Auto-Scan
Users that are interested in Auto-Scan are comparing it to the libraries listed below
Sorting:
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- Script en Bash que automatiza todos los pasos para retransmitir la solicitud de autenticación SMB con el objetivo de obtener una Shell.☆23Jul 16, 2025Updated 7 months ago
- PowerShell alternative/restriction bypass☆11Apr 6, 2025Updated 10 months ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- SendToXray - Burp Suite Extender, Send HTTP request to XRAY proxy.☆11May 22, 2021Updated 4 years ago
- WordPress version scanner written in Python.☆15Jun 18, 2024Updated last year
- CVE, reports, research☆15Mar 17, 2021Updated 4 years ago
- wpscan is a vulnerability recognition tool in CMS Wordpress developed in Go.☆14Jun 16, 2021Updated 4 years ago
- A simple PHP web backdoor allows you to retrieve directory/file contents and upload file(s) from the local machine or remote URL.☆20Sep 18, 2021Updated 4 years ago
- ☆18Oct 4, 2020Updated 5 years ago
- Subdomain discovery using Sublist3r, certspotter, crt.sh , censys and amass . Subdomain bruteforcing using Gobuster and Resolve hosts usi…☆16Oct 8, 2024Updated last year
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- DirBruter is a Python based CLI tool. It looks for hidden or existing directories/files using brute force method. It basically works by l…☆17Nov 15, 2023Updated 2 years ago
- [EN] BETA: Layla - recon tool for bug bounty☆75Feb 9, 2022Updated 4 years ago
- Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined mod…☆19Jul 21, 2021Updated 4 years ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount☆21Apr 26, 2020Updated 5 years ago
- Cool One Liners at one place to make your recon and bug bounty skills better !☆15Oct 3, 2020Updated 5 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Nov 21, 2021Updated 4 years ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Aug 9, 2021Updated 4 years ago
- Endpoint monitor tool☆21Sep 16, 2020Updated 5 years ago
- A penetration testing and vulnerability management application written using the powerful django framework.☆30Nov 22, 2023Updated 2 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆27Apr 17, 2022Updated 3 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Dec 23, 2024Updated last year
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- A flask web app made for scanning vulnerabilites on a website, network exploitation, reconnaissance☆27Jan 16, 2023Updated 3 years ago
- nmap scripts (nse files) to identify vulnerabilities☆29Feb 17, 2026Updated last week
- A Tool that Finds, Enumerates, and Exploits Reolink Cameras.☆126Aug 28, 2021Updated 4 years ago
- Information-Gathering Shell Script☆29Oct 17, 2020Updated 5 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆72Dec 28, 2023Updated 2 years ago
- ☆33Jan 25, 2021Updated 5 years ago
- CVE-2021-40444☆66Dec 19, 2021Updated 4 years ago
- Full Auto Exploit tool to SQL Injection: Admin Find -dork generation and grab from cx-Security and proxy cheaker and more :)☆29Feb 22, 2018Updated 8 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆144Feb 19, 2026Updated last week
- One liner regex match to search inside JS files, using curl and grep!☆29Dec 26, 2021Updated 4 years ago