Mr-xn / infohunterLinks
pentester payload ,info hunte
☆12Updated 3 years ago
Alternatives and similar repositories for infohunter
Users that are interested in infohunter are comparing it to the libraries listed below
Sorting:
- Automatic monitor github cve using Github Actions☆10Updated 5 months ago
- Impacket is a collection of Python classes for working with network protocols.☆12Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- ShellC0de Generator☆11Updated 4 years ago
- An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.☆12Updated 4 years ago
- 51Pwn Platform,为黑客而生的大数据搜索引擎,Big data search engine born for hackers☆31Updated 7 months ago
- ☆26Updated 2 years ago
- Burpsuite Plugin to bypass strict RePlay protection☆12Updated 4 years ago
- Magento Security Scanner☆15Updated 3 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Updated last year
- Small python or powershell script to look for potential subdomain takeover vulnerabilities via vulnerable Alias.☆8Updated 3 years ago
- It finds Subject Alternative Names for a given list of domains☆8Updated 3 years ago
- Subdomain Scan (knockpy) in Python3☆12Updated 4 years ago
- Jok3r - Network and Web Pentest Framework☆17Updated 6 years ago
- my mini collection of exploits and scripts for pentest☆12Updated 2 years ago
- 🐍 Python Exploit for CVE-2022-23935☆13Updated 2 years ago
- a sqlmap extender for burp☆15Updated last year
- ☆12Updated 2 years ago
- Personally developed tools for buffer overflow attacks☆24Updated 2 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆16Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Steal telegram session Bypass 2fa☆18Updated 2 years ago
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆32Updated 3 months ago
- Machine Learning basics with phishing dataset☆11Updated 4 years ago
- Exploit for the unauthenticated file upload vulnerability in WordPress's Royal Elementor Addons and Templates plugin (< 1.3.79). CVE-ID: …☆9Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- A SMTP Checker / SMTP Cracker with SOCKS support and e-mail delivery test (inbox check) for mailpass combolists.☆14Updated 3 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Updated 3 years ago
- Bruteforce tool for Pentester's lucky day targeting SSH-services.☆13Updated 4 years ago
- go-utils☆11Updated 11 months ago