RoseSecurity / ScrapPY
ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offensive security tools to perform brute force, forced browsing, and dictionary attacks against targets. The tool dives deep to discover keywords and phrases leading to potential passwords or hidden directories.
☆199Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for ScrapPY
- Nuclei templates for honeypots detection.☆194Updated last year
- Shodan Dorks 2023☆232Updated last year
- Automate Scoping, OSINT and Recon assessments.☆92Updated 2 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆175Updated 4 months ago
- Red Team Guides☆134Updated 10 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆85Updated 7 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆129Updated 4 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆128Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆98Updated last year
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆94Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆159Updated 6 months ago
- A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆328Updated 4 months ago
- ☆135Updated this week
- Discover and track internet assets using favicon hashes through search engines.☆121Updated last month
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆152Updated 5 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆142Updated 3 months ago
- Dredging up secrets from the depths of the file system☆116Updated 2 weeks ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Palestine.☆25Updated 6 months ago
- My public notes about offensive security☆148Updated 11 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆180Updated 2 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆124Updated 4 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆54Updated last year
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆107Updated this week
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- ☆134Updated last year
- Search for sensitive data in Postman public library.☆184Updated 3 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated 5 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 5 months ago
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆155Updated 6 months ago
- Azure mindmap for penetration tests☆161Updated last year