OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions
☆101Jul 20, 2023Updated 2 years ago
Alternatives and similar repositories for raider
Users that are interested in raider are comparing it to the libraries listed below
Sorting:
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- AWS Security Tool☆29Jan 1, 2024Updated 2 years ago
- D3Ext's Forward Shell☆120Oct 15, 2023Updated 2 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 6 months ago
- XSS PoCs to elevate your alert()☆22May 18, 2023Updated 2 years ago
- ☆17Jul 31, 2021Updated 4 years ago
- The long shadow to emerge as other Git repositories☆18Updated this week
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆38May 23, 2022Updated 3 years ago
- ip-keyloger☆10Jan 9, 2026Updated last month
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- Headless web crawler for bugbounty and penetration-testing/redteaming☆39Mar 25, 2024Updated last year
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆407Jan 22, 2025Updated last year
- This is a simple network scanner used to scan any range of IP Address to get their MAC Address. The code is written completely in Python …☆24Aug 29, 2021Updated 4 years ago
- ☆11Nov 5, 2022Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Jan 31, 2022Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- Movement Detector using python☆10Jan 5, 2021Updated 5 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- ☆11Mar 2, 2019Updated 7 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆27Apr 17, 2022Updated 3 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆28Feb 1, 2026Updated last month
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆187Jun 22, 2022Updated 3 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- A platform Where A User can Find the Online Presence of Social Media Handle on the Internet.☆12Apr 10, 2021Updated 4 years ago
- ☆71Nov 8, 2021Updated 4 years ago
- A chat application with end to end encryption with centralized authentication system using Raspberry pi and a 4x4 Matrix Keypad for secur…☆13Mar 21, 2023Updated 2 years ago
- ☆12Mar 4, 2023Updated 2 years ago
- Command and Control Framework☆13Mar 23, 2024Updated last year
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated last year
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆953Dec 31, 2021Updated 4 years ago
- A semi-automatic osint/recon framework.☆25May 22, 2024Updated last year
- Sifter - All purpose penetration testing op-center☆82Nov 23, 2022Updated 3 years ago