alertot / detectem
detectem - detect software and its version on websites.
☆154Updated 3 years ago
Alternatives and similar repositories for detectem:
Users that are interested in detectem are comparing it to the libraries listed below
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 6 years ago
- A Github organization reconnaissance tool.☆216Updated last year
- Mercure is a tool for security managers who want to train their colleague to phishing.☆267Updated 3 years ago
- A small python script to check for Cross-Site Tracing (XST)☆136Updated 8 years ago
- Censys.io Python API Search☆42Updated 7 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆102Updated 7 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆112Updated 4 years ago
- Automated digital reconnaissance☆194Updated 2 years ago
- Subdomain Analyzer☆76Updated 7 years ago
- Create a list of bad actors from public IP blacklist.☆75Updated 6 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆186Updated 5 years ago
- Tool for breaking into web applications.☆90Updated 5 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆97Updated 7 years ago
- SPIP (CMS) Scanner for penetration testing purpose written in Python☆70Updated 10 years ago
- Entropy is a (prototype) WAF driven by maths.☆55Updated 5 years ago
- A Django vulnerable Web application for testing the w3af framework☆31Updated 2 years ago
- Detect silent (unwanted) changes to files on your system☆159Updated 4 years ago
- Extracting URLs of a specific target based on the results of "commoncrawl.org"☆271Updated last year
- Automated WiFi limit evasion☆119Updated 7 years ago
- proxy poc implementation of STARTTLS stripping attacks☆166Updated 3 years ago
- Automatic firewall rule orchestator.☆82Updated 7 years ago
- Docker image for DVWA(Damn Vulnerable Web Application)☆100Updated 8 years ago
- ssh public host key scanner using shodan☆117Updated 5 years ago
- Resources for developers and security engineers to learn the ropes of application security☆98Updated 6 years ago