RoseSecurity / ScrapPYLinks
ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offensive security tools to perform brute force, forced browsing, and dictionary attacks against targets. The tool dives deep to discover keywords and phrases leading to potential passwords or hidden directories.
☆221Updated 7 months ago
Alternatives and similar repositories for ScrapPY
Users that are interested in ScrapPY are comparing it to the libraries listed below
Sorting:
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- Automate Scoping, OSINT and Recon assessments.☆98Updated last month
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆161Updated 2 months ago
- ☆196Updated 2 years ago
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆110Updated 2 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆135Updated last year
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆194Updated 9 months ago
- A Slack bot phishing framework for Red Teaming exercises☆165Updated last year
- A repository with informtion related to Cloud Osint☆108Updated 8 months ago
- Just some lists of Malware Configs☆173Updated 11 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆136Updated last year
- Red Team Guides☆143Updated last year
- A list of awesome penetration testing tools and resources.☆81Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆124Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆105Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆103Updated 10 months ago
- Discover and monitor internet assets using favicon hashes across search engines.☆220Updated 2 months ago
- List of Command&Control (C2) software☆46Updated 3 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- Dredging up secrets from the depths of the file system☆131Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆140Updated 2 years ago
- ☆65Updated 2 years ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆317Updated last year
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆204Updated last year
- My public notes about offensive security☆164Updated 3 months ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆163Updated 7 months ago