RossGeerlings / webstor
WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted servers via zone transfer data - stores their responses, and lets you query for known web technologies, including those with zero-day vulnerabilities.
☆158Updated last year
Alternatives and similar repositories for webstor
Users that are interested in webstor are comparing it to the libraries listed below
Sorting:
- A pre-DDoS security assessment tool☆120Updated 3 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆133Updated 3 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆120Updated 2 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- A WLAN red team framework.☆153Updated 7 months ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- Tool to discover external and internal network attack surface☆196Updated 11 months ago
- automated password spraying tool☆148Updated 3 years ago
- Scans SPF and DMARC records for issues that could allow email spoofing.☆130Updated 2 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆222Updated 4 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Updated 3 years ago
- Shodan Monitoring integration for TheHive.☆130Updated 5 months ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆128Updated 3 years ago
- Offensive Security recon tool☆92Updated 3 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆183Updated 2 years ago
- A custom built DNS bruteforcer with multi-threading, and handling of bad resolvers.☆57Updated 3 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Updated 2 years ago
- AWS, Azure, Alibaba and Google bucket scanner☆150Updated last year
- A set of recipes useful in pentesting and red teaming scenarios☆143Updated last year
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆115Updated last year
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- A GraphQL enumeration and extraction tool☆131Updated 2 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆344Updated 4 years ago
- Objectify-s3 is a tool that recursively checks AWS S3 buckets and objects for misconfigured permissions.☆15Updated 9 months ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆64Updated 7 months ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆18Updated 4 years ago