ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offensive security tools to perform brute force, forced browsing, and dictionary attacks against targets. The tool dives deep to discover keywords and phrases leading to potential passwords or hidden directories.
☆223May 2, 2025Updated last year
Alternatives and similar repositories for ScrapPY
Users that are interested in ScrapPY are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- ☆80Apr 18, 2023Updated 3 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 4 years ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆151Jun 5, 2025Updated 11 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆201Jun 25, 2024Updated last year
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆750Oct 25, 2025Updated 6 months ago
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆385Apr 16, 2022Updated 4 years ago
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,869Apr 27, 2026Updated 3 weeks ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- Serverless Redirector in various cloud vendor for red team☆73Dec 8, 2022Updated 3 years ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆314May 16, 2024Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory☆336Jun 22, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆198Jan 18, 2023Updated 3 years ago
- Easy red team phishing with Puppeteer☆133Feb 6, 2023Updated 3 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆86Jan 6, 2023Updated 3 years ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆279May 10, 2024Updated 2 years ago
- Your Windows syscall hooking factory - feat Canterlot's Gate - All accessible over MCP☆130May 11, 2026Updated last week
- An Office365 User Attack Tool☆652Mar 19, 2024Updated 2 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆322Sep 23, 2022Updated 3 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 3 years ago
- A PoC for achieving persistence via push notifications on Windows☆49Jun 9, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Feb 13, 2024Updated 2 years ago
- whois command implemented by golang with awesome whois servers list☆63Jun 1, 2023Updated 2 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆422Mar 21, 2025Updated last year
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆262May 10, 2023Updated 3 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Jul 19, 2024Updated last year
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆504Jan 23, 2023Updated 3 years ago
- Bypass Malware Time Delays☆105Sep 23, 2022Updated 3 years ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆258Apr 3, 2025Updated last year
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆425May 29, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆398Aug 2, 2023Updated 2 years ago
- A standalone DLL that exports databases in cleartext once injected in the KeePass process.☆301Mar 1, 2023Updated 3 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆377Mar 24, 2026Updated last month
- A sock, with a wire, so you can tunnel all you desire.☆298Jan 19, 2024Updated 2 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆254Mar 7, 2022Updated 4 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 3 years ago
- yet another AV killer tool using BYOVD☆314Dec 12, 2023Updated 2 years ago