CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result
☆68Jan 15, 2026Updated 2 months ago
Alternatives and similar repositories for WAES
Users that are interested in WAES are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 4 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Jul 20, 2019Updated 6 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆271Mar 24, 2021Updated 5 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Dec 23, 2024Updated last year
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 8 months ago
- A tool written in python for scraping firebase data☆43Apr 5, 2020Updated 5 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Jul 4, 2020Updated 5 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- A Linux enumeration script for Hack The Box☆191Nov 27, 2019Updated 6 years ago
- Let's find someone's account☆168Jun 13, 2019Updated 6 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 7 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆16Mar 31, 2021Updated 4 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- ☆15Aug 31, 2020Updated 5 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Feb 18, 2023Updated 3 years ago
- ☆177Jul 5, 2023Updated 2 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Tool to find SMTP servers vulnerable to open relay☆82Feb 13, 2020Updated 6 years ago
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 6 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- This extension provides a way to discover NoSQL injection vulnerabilities.☆26Sep 7, 2025Updated 6 months ago
- gtfobin checker☆11Oct 25, 2020Updated 5 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Apr 29, 2021Updated 4 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 3 years ago
- A simple XSS finding tool☆111Nov 9, 2018Updated 7 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- A very fast and smart web directory and file enumeration tool written in C.☆141Sep 15, 2025Updated 6 months ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆87May 6, 2023Updated 2 years ago