adulau / active-scanning-techniquesLinks
A compilation of network scanning strategies to find vulnerable devices
☆73Updated 2 years ago
Alternatives and similar repositories for active-scanning-techniques
Users that are interested in active-scanning-techniques are comparing it to the libraries listed below
Sorting:
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 4 years ago
- Default plugins for Jaeles Scanner☆35Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- ☆36Updated 9 months ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated 2 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- ☆26Updated 3 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- ☆24Updated last year
- Query various sources for CVE proof-of-concepts☆51Updated 2 years ago
- A Burp Suite extension for headless, unattended scanning.☆37Updated 5 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Updated 2 years ago
- Nmap script to check vulnerability CVE-2021-21975☆28Updated 4 years ago
- ☆42Updated 6 months ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Updated 4 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆17Updated 4 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Dump exposed HTTP .git fast☆50Updated 2 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Updated last year
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago