N0MoreSecr3ts / wraith
Uncover forgotten secrets and bring them back to life, haunting security and operations teams.
☆207Updated last year
Alternatives and similar repositories for wraith:
Users that are interested in wraith are comparing it to the libraries listed below
- A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for…☆189Updated 4 years ago
- secretz, minimizing the large attack surface of Travis CI☆325Updated 2 years ago
- Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.☆243Updated this week
- A simple SSRF-testing sheriff written in Go☆324Updated 4 months ago
- GoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fing…☆205Updated last year
- Find cloud assets that no one wants exposed 🔎 ☁️☆338Updated 4 years ago
- Simple shell script for automated domain recognition with some tools☆299Updated 4 years ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆202Updated 4 months ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆210Updated 4 years ago
- A script that can resolve an input file of domains and scan them with masscan☆157Updated 4 years ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆174Updated 2 years ago
- Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures t…☆209Updated 4 years ago
- Bugbounty scope tool☆325Updated last week
- These are the regexes that power truffleHog☆215Updated 2 years ago
- Python library and CLI for the Bug Bounty Recon API☆223Updated 3 years ago
- Tool for catching and logging different types of requests.☆220Updated 4 years ago
- ☆173Updated 2 years ago
- ☆244Updated 8 months ago
- Cross Origin Resource Sharing MisConfiguration Scanner☆172Updated 3 years ago
- ☆275Updated 3 years ago
- You can read the writeup on this script here☆193Updated 3 years ago
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆300Updated 2 years ago
- Adds a customizable "Send to..."-context-menu to your BurpSuite.☆153Updated 2 years ago
- Trying to make automated recon for bug bounties☆252Updated 3 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- Find AWS S3 buckets and test their permissions.☆377Updated last year
- Bass grabs you those "extra resolvers" you are missing out on when performing Active DNS enumeration. Add anywhere from 100-6k resolvers …☆145Updated 11 months ago
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modules☆189Updated 3 years ago
- My Recon Automation☆194Updated 3 years ago
- ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on sc…☆318Updated this week