UncleJ4ck / BoxerLinks
Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc
☆18Updated 2 years ago
Alternatives and similar repositories for Boxer
Users that are interested in Boxer are comparing it to the libraries listed below
Sorting:
- Bash script for CTF automating basic enumeration☆43Updated 3 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Updated last year
- web application pentesting tools for docker☆18Updated 3 years ago
- ☆12Updated 3 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 2 years ago
- Just another script for automatize boolean-based blind SQL injections. (Demo)☆54Updated 3 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated last year
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated 8 months ago
- Simple recon tool automates your recon process☆17Updated 2 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Updated 2 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆18Updated 4 years ago
- ☆28Updated 2 years ago
- Extendable Python script handler for automating penetration testing.☆40Updated 2 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- Yet another web recon tool☆62Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- ☆12Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- [EN] BETA: Layla - recon tool for bug bounty☆76Updated 3 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Updated 3 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆19Updated 2 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆47Updated last year
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆23Updated 2 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆36Updated 4 years ago
- Bash script to generate reverse shell payloads☆20Updated last year