RoseSecurity / ScrapPYLinks
ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offensive security tools to perform brute force, forced browsing, and dictionary attacks against targets. The tool dives deep to discover keywords and phrases leading to potential passwords or hidden directories.
☆222Updated 9 months ago
Alternatives and similar repositories for ScrapPY
Users that are interested in ScrapPY are comparing it to the libraries listed below
Sorting:
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- ☆198Updated 3 years ago
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆110Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆162Updated 4 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- Red Team Guides☆144Updated 2 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated last year
- A collection of tools that I use in CTF's or for assessments☆107Updated last year
- Automate Scoping, OSINT and Recon assessments.☆111Updated this week
- ☁️ Curated Cloud OSINT resources — dorks, tools, and techniques for AWS, Azure, GCP, Oracle Cloud, and other major providers reconnaissan…☆110Updated 2 weeks ago
- A Slack bot phishing framework for Red Teaming exercises☆166Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Updated last year
- Dredging up secrets from the depths of the file system☆132Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆93Updated 8 months ago
- Discover and monitor internet assets using favicon hashes across search engines.☆223Updated 3 months ago
- My public notes about offensive security☆166Updated 5 months ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆163Updated 9 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆195Updated 11 months ago
- ☆65Updated 2 years ago
- List of Command&Control (C2) software☆47Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- Just some lists of Malware Configs☆173Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆144Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆127Updated last month
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- ☆55Updated last year