Ne0nd0g / apt2Links
automated penetration toolkit
☆12Updated 9 years ago
Alternatives and similar repositories for apt2
Users that are interested in apt2 are comparing it to the libraries listed below
Sorting:
- PHP tool to test XSS☆22Updated 6 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 7 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Updated 8 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Updated 7 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Updated 6 years ago
- Clickjacking PoC Generator☆35Updated 5 years ago
- Interactive Post Exploitation Tool☆37Updated 6 years ago
- An Extended, Modulair, Host Discovery Framework☆42Updated 7 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Updated 9 years ago
- ☆33Updated last year
- automatic scan for hackthebox☆13Updated 6 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated 2 months ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Updated 6 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Updated 8 years ago
- Code snippets I find useful☆32Updated 8 years ago
- Bug Bounty Clipboard☆17Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Updated 6 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Credentials Checking Framework☆53Updated 3 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29Updated 2 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Updated 6 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- DNS Enumeration with Asynchronicity☆45Updated 7 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Updated 8 years ago
- Unique wordlist generator of unique wordlists.☆41Updated 2 years ago
- A Pythonic wrapper to MassDNS☆24Updated 7 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 8 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago