RedSiege / EyeWitnessLinks
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
☆5,530Updated 3 weeks ago
Alternatives and similar repositories for EyeWitness
Users that are interested in EyeWitness are comparing it to the libraries listed below
Sorting:
- A Tool for Domain Flyovers☆5,885Updated 3 years ago
- DNS Enumeration Script☆2,903Updated last week
- CeWL is a Custom Word List Generator☆2,471Updated last month
- Web application fuzzer☆6,339Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,718Updated 2 years ago
- A swiss army knife for pentesting networks☆8,987Updated last year
- HTTP parameter discovery suite.☆5,956Updated 9 months ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,872Updated 4 years ago
- Knock Subdomain Scan☆4,100Updated last month
- File upload vulnerability scanner and exploitation tool.☆3,279Updated 6 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,145Updated this week
- Linux privilege escalation auditing tool☆6,287Updated last year
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,308Updated last year
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,786Updated last year
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,810Updated 6 months ago
- A python script that finds endpoints in JavaScript files☆4,184Updated last year
- The ultimate WinRM shell for hacking/pentesting☆5,134Updated 2 months ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,452Updated 10 months ago
- Fast subdomains enumeration tool for penetration testers☆10,719Updated last year
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,147Updated 2 years ago
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆6,027Updated 2 months ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,694Updated 11 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,536Updated this week
- A curated list of amazingly awesome Burp Extensions☆3,319Updated 9 months ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,334Updated last week
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,745Updated 3 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,078Updated last year
- Next generation web scanner☆6,223Updated last month
- Monitor linux processes without root permissions☆5,784Updated 2 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,393Updated 2 months ago