ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offensive security tools to perform brute force, forced browsing, and dictionary attacks against targets. The tool dives deep to discover keywords and phrases leading to potential passwords or hidden directories.
☆223May 2, 2025Updated 11 months ago
Alternatives and similar repositories for ScrapPY
Users that are interested in ScrapPY are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆33Jan 23, 2022Updated 4 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆50May 22, 2025Updated 11 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆35Aug 15, 2024Updated last year
- ☆15Feb 9, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆80Apr 18, 2023Updated 3 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 3 years ago
- /dev/tty☆29Mar 31, 2026Updated 3 weeks ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆151Jun 5, 2025Updated 10 months ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Nov 14, 2022Updated 3 years ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆201Jun 25, 2024Updated last year
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆750Oct 25, 2025Updated 6 months ago
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆384Apr 16, 2022Updated 4 years ago
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,864Updated this week
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆48Mar 8, 2023Updated 3 years ago
- Serverless Redirector in various cloud vendor for red team☆73Dec 8, 2022Updated 3 years ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆314May 16, 2024Updated last year
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory☆337Jun 22, 2024Updated last year
- ☆198Jan 18, 2023Updated 3 years ago
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆86Jan 6, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆277May 10, 2024Updated last year
- Your Windows syscall hooking factory - feat Canterlot's Gate - All accessible over MCP☆130Apr 22, 2026Updated last week
- An Office365 User Attack Tool☆651Mar 19, 2024Updated 2 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆322Sep 23, 2022Updated 3 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Feb 5, 2022Updated 4 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 3 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆419Mar 21, 2025Updated last year
- A tool to find folders excluded from AV real-time scanning using a time oracle☆233Feb 13, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- whois command implemented by golang with awesome whois servers list☆63Jun 1, 2023Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆261May 10, 2023Updated 2 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆501Jan 23, 2023Updated 3 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆137Jul 19, 2024Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆259Apr 3, 2025Updated last year
- Bypass Malware Time Delays☆105Sep 23, 2022Updated 3 years ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆422May 29, 2024Updated last year