RossGeerlings / webstorLinks
WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted servers via zone transfer data - stores their responses, and lets you query for known web technologies, including those with zero-day vulnerabilities.
☆158Updated last year
Alternatives and similar repositories for webstor
Users that are interested in webstor are comparing it to the libraries listed below
Sorting:
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆120Updated 2 years ago
- A pre-DDoS security assessment tool☆120Updated 3 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆134Updated 3 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆197Updated this week
- Offensive Security recon tool☆92Updated 3 years ago
- Tool to discover external and internal network attack surface☆198Updated last year
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 10 months ago
- automated web assets enumeration & scanning [DEPRECATED]☆289Updated 2 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- A WLAN red team framework.☆154Updated 7 months ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆222Updated 4 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- automated password spraying tool☆148Updated 3 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆122Updated 2 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆345Updated 4 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆183Updated 2 years ago
- Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered fo…☆201Updated 2 years ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆180Updated last year
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆187Updated 10 months ago
- Target practice for ffuf☆65Updated 3 years ago
- Red Team tools weaponized☆106Updated 3 months ago
- Shodan Monitoring integration for TheHive.☆130Updated 5 months ago
- One way to continuously monitor sensitive information that could be exposed on Github☆178Updated 4 years ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆51Updated last week
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago
- A burp suite extension that enumerates infrastructure and application admin interfaces (OTG-CONFIG-005)☆118Updated 2 years ago
- A custom built DNS bruteforcer with multi-threading, and handling of bad resolvers.☆57Updated 3 years ago