RevoltSecurities / ZoomeyeSearchLinks
A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.
☆49Updated 2 months ago
Alternatives and similar repositories for ZoomeyeSearch
Users that are interested in ZoomeyeSearch are comparing it to the libraries listed below
Sorting:
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆71Updated 10 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 9 months ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆73Updated last month
- ☆24Updated last year
- ☆27Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆28Updated last year
- A fast Go-based tool to uncover sensitive information in JavaScript☆34Updated last month
- CVE-2024-28955 Exploitation PoC☆33Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated last month
- Admin Directory Finder is a tool designed to scan and identify directories under admin paths, such as admin/dashboard.php. It helps in se…☆29Updated 2 months ago
- A Simple JS code to keylogger data and send it to the personal server☆31Updated 7 months ago
- ☆52Updated 8 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆84Updated 10 months ago
- This repository contains the best fuzzing wordlist files☆34Updated 8 months ago
- ☆65Updated last year
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆54Updated 7 months ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 3 years ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated 8 months ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆40Updated 2 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆33Updated last year
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for…☆14Updated 2 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆101Updated this week
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆123Updated this week
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- Discovering Typo Squatting on your domains!☆72Updated last year
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆122Updated 3 months ago