The404Hacking / Sn1per
Automated Pentest Recon Scanner
☆14Updated 6 years ago
Related projects: ⓘ
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆18Updated last year
- WebHook for Red Team☆24Updated 3 years ago
- Another vulnerability scanner☆17Updated 10 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Red Teaming Tactics and Techniques☆13Updated 2 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆16Updated 3 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆33Updated last week
- A wrapper around tools used for port scanning(nmap, naabu & masscan), the goal being reducing scan time, increasing scan efficiency and a…☆11Updated 6 months ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆16Updated 4 years ago
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆12Updated 2 years ago
- 🔥Ready, Aim, Fire.🔥☆10Updated 2 years ago
- A tool for generating reverse shell payloads on the fly.☆10Updated 2 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆10Updated 5 years ago
- ☆18Updated this week
- Rockyou for web fuzzing☆13Updated 2 years ago
- ☆27Updated this week
- An automated e-mail OSINT tool☆17Updated 2 years ago
- Fast subdomains enumeration tool for penetration testers☆14Updated 4 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated last month
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated last year
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆16Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆10Updated last year
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆9Updated 3 years ago
- List of Github repositories and articles with list of dorks for different search engines☆23Updated 2 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆41Updated last year
- Who We Are☆15Updated last week
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆11Updated 2 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Updated 3 years ago
- ☆12Updated last year
- BlueTeam, RedTeam, Bug bounty, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploitation,…☆45Updated this week