alertot / detectem
detectem - detect software and its version on websites.
☆154Updated 3 years ago
Alternatives and similar repositories for detectem:
Users that are interested in detectem are comparing it to the libraries listed below
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 3 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 6 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆98Updated 7 years ago
- Web application/technology detection tool☆208Updated last year
- Resources for developers and security engineers to learn the ropes of application security☆97Updated 6 years ago
- Entropy is a (prototype) WAF driven by maths.☆55Updated 5 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- A small python script to check for Cross-Site Tracing (XST)☆136Updated 9 years ago
- SPIP (CMS) Scanner for penetration testing purpose written in Python☆70Updated 10 years ago
- Censys.io Python API Search☆42Updated 7 years ago
- A REST API security testing framework.☆327Updated 3 years ago
- Create a list of bad actors from public IP blacklist.☆75Updated 6 years ago
- A Github organization reconnaissance tool.☆216Updated last year
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆104Updated 7 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆187Updated 5 years ago
- Automated WiFi limit evasion☆119Updated 8 years ago
- ☆92Updated 6 years ago
- Extracting URLs of a specific target based on the results of "commoncrawl.org"☆271Updated last year
- Mass scanning and fuzzing library☆49Updated 7 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆60Updated 4 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆112Updated 4 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Updated 6 years ago
- Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.☆215Updated 5 years ago
- Subdomain Analyzer☆76Updated 7 years ago
- ☆71Updated 9 years ago
- User, contributor and developer friendly vulnerability database☆129Updated 6 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆138Updated 4 years ago
- Search exploits in multiple exploit databases!☆81Updated 4 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago