alechilczenko / spidex
Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.
☆249Updated 2 years ago
Alternatives and similar repositories for spidex:
Users that are interested in spidex are comparing it to the libraries listed below
- Pentesting automation platform that combines hacking tools to complete assessments☆461Updated last month
- For pentesters who don't wanna leave their terminals.☆183Updated 3 years ago
- A WLAN red team framework.☆149Updated 4 months ago
- Yet another content discovery tool☆119Updated 3 months ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆119Updated 2 years ago
- Nightingale Docker for Pentesters is a comprehensive Dockerized environment tailored for penetration testing and vulnerability assessment…☆266Updated last month
- Google Dork File Finder☆191Updated last month
- A Holistic OSINT and Threat Hunting Platform☆520Updated last month
- Turn PuTTY into an SSH login bruteforcing tool.☆283Updated 4 years ago
- A web front-end for password cracking and analytics☆365Updated this week
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆398Updated last year
- Vulnerability assessment and penetration testing automation and reporting platform for teams.☆442Updated 2 months ago
- A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a …☆584Updated this week
- All in one tool to make your hacking easier.☆189Updated 2 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 7 months ago
- ☆316Updated last month
- fully automated pentesting tool☆508Updated 2 years ago
- Divide full port scan results and use it for targeted Nmap runs☆315Updated 7 months ago
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆346Updated last year
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆553Updated 3 years ago
- Wordlists handcrafted (and automated) with ♥☆215Updated 10 months ago
- Automated rogue access point setup tool.☆192Updated 3 years ago
- How to search on the shodan.io website☆119Updated 4 years ago
- Pentest: Subdomains enumeration tool for penetration testers.☆157Updated 9 months ago
- A Powerful Sensor Tool to discover login panels, and POST Form SQLi Scanning☆477Updated last year
- An online handy-recon tool☆258Updated last year
- [EN] BETA: Layla - recon tool for bug bounty☆76Updated 3 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆193Updated 3 years ago
- This Python script can be used to bypass IP source restrictions using HTTP headers.☆381Updated 3 weeks ago
- Remote persistent 🔑Logger for Windows and Linux☆299Updated last year