RossGeerlings / webstorLinks
WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted servers via zone transfer data - stores their responses, and lets you query for known web technologies, including those with zero-day vulnerabilities.
☆157Updated last year
Alternatives and similar repositories for webstor
Users that are interested in webstor are comparing it to the libraries listed below
Sorting:
- A pre-DDoS security assessment tool☆120Updated 4 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆134Updated 4 years ago
- Offensive Security recon tool☆92Updated 4 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆121Updated 3 years ago
- automated password spraying tool☆147Updated 4 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Updated 2 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆81Updated 4 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- Docker image for Osmedeus, a fully automated offensive security tool for reconnaissance and vulnerability scanning☆103Updated 3 months ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆121Updated last year
- Tool to discover external and internal network attack surface☆204Updated last year
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- Python resource library for creating security related tooling☆79Updated last year
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 3 years ago
- ☆90Updated 3 years ago
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆25Updated 4 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆38Updated 5 years ago
- A WLAN red team framework.☆154Updated last year
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆65Updated 7 years ago
- Tools to assess the DNS security of web applications☆128Updated 3 years ago
- Identify IP addresses owned by public cloud providers☆127Updated last year
- REST-Attacker is designed as a proof-of-concept for the feasibility of testing generic real-world REST implementations. Its goal is to pr…☆80Updated 2 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆226Updated 4 years ago
- Scans SPF and DMARC records for issues that could allow email spoofing.☆133Updated 3 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆38Updated last week