Python based script for Information Gathering.
☆105Jan 13, 2026Updated 2 months ago
Alternatives and similar repositories for 53R3N17Y
Users that are interested in 53R3N17Y are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Easy way to brute-force web directory.☆161Jun 2, 2019Updated 6 years ago
- SuperNES - Super Nmap Easy Scanner☆10Oct 2, 2018Updated 7 years ago
- Crascan is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner.☆31Nov 4, 2018Updated 7 years ago
- ☆13Apr 19, 2019Updated 6 years ago
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- search for hosts info with shodan☆233Jun 14, 2021Updated 4 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 4 months ago
- Web Crawler, Scanner, and Analyzer Framework (Shell-Script based)☆102Jun 20, 2019Updated 6 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- Real Time Threat Monitoring Tool☆115Nov 16, 2022Updated 3 years ago
- Linux Kernel Exploit, a PoC ( Proof of Concept )☆20Mar 5, 2018Updated 8 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Echo Hack The Talk Materials 2019☆12Sep 12, 2019Updated 6 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Check if a IP is from tor or is a malicious proxy☆57Feb 9, 2021Updated 5 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆65Jan 11, 2023Updated 3 years ago
- Burp suite HTTP history advanced search☆10Mar 20, 2018Updated 8 years ago
- Python API wrapper and command-line client for the tools hosted on spyse.com.☆271Aug 18, 2020Updated 5 years ago
- An OSINT tool to find contacts in order to report security vulnerabilities.☆268Jan 27, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Just an experiment with hash cracking :) few password lists along with some good password cracking rule sets.☆13Feb 29, 2020Updated 6 years ago
- Python script that gets Twitter users' tweets location☆109Apr 10, 2018Updated 7 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.☆81Aug 28, 2017Updated 8 years ago
- WhatsApp Forensic Tool☆175Jul 15, 2020Updated 5 years ago
- Multi source CVE/exploit parser.☆27Aug 30, 2017Updated 8 years ago
- Web Sight Front-end Community Edition☆24May 25, 2020Updated 5 years ago
- InfoPath Phishing Repo Resource☆68Oct 26, 2017Updated 8 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]☆305Oct 14, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Sep 9, 2022Updated 3 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆37Mar 13, 2021Updated 5 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Apr 10, 2019Updated 6 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆471Nov 14, 2019Updated 6 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Jan 21, 2019Updated 7 years ago
- Leak File Analyzer☆63Nov 12, 2017Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Nov 27, 2018Updated 7 years ago