Bug Bounty ultimate tool
☆28Dec 3, 2025Updated 3 months ago
Alternatives and similar repositories for greaper
Users that are interested in greaper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆28Nov 3, 2024Updated last year
- ☆18Apr 26, 2025Updated 10 months ago
- A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.☆19Mar 26, 2025Updated 11 months ago
- Simple python3 script to automate CVE-2018-9995☆11Feb 20, 2024Updated 2 years ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18May 7, 2024Updated last year
- Javascript sourcemaps enumeration tool☆15Dec 19, 2024Updated last year
- Templtor is a bash script that will gather all the community Nuclei templates.☆30Dec 19, 2025Updated 3 months ago
- ☆11Jul 26, 2017Updated 8 years ago
- To use hackJS, specify a target URL that contains JavaScript files you want to analyze. The tool will fetch these JavaScript files, extra…☆20Jun 19, 2025Updated 9 months ago
- WhatsApp Web phishing page for authorized pentesting. Captures international phone numbers + OTP codes with pixel-perfect 2026 UI. Real-t…☆39Mar 6, 2026Updated 2 weeks ago
- ☆17Apr 25, 2018Updated 7 years ago
- ☆44Nov 19, 2025Updated 4 months ago
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Dec 10, 2024Updated last year
- A quick bug bounty guide for beginners☆92May 3, 2025Updated 10 months ago
- Web Recon Tool 🔍 An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information …☆25Feb 23, 2026Updated last month
- A modern tool written in python for hunting open redirection☆29Aug 8, 2023Updated 2 years ago
- This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network securit…☆30Apr 10, 2024Updated last year
- Simple script to bulk check if IPs match networks☆11Jan 11, 2022Updated 4 years ago
- Fback is a tool that helps you create target-specific wordlists using a .json pattern.☆63Nov 21, 2025Updated 4 months ago
- This repository contains all the GF-Patterns Repositories. All we have to do is just to run the given Shell File and it's Done !!☆21Jun 28, 2025Updated 8 months ago
- ParamScan is a chrome extension for finding reflected parameters in a webpage.☆92Jan 11, 2025Updated last year
- Scraped eBay-Kleinanzeigen alle 10 Minuten nach Wohnungen, die deinen Kriterien entsprechen und sendet dir eine SMS um schnell agieren zu…☆14Aug 25, 2020Updated 5 years ago
- ftp-scan is a anonymous login and vulnerable ftp service scanner. it is made for ctf's and penetration testing.It is made in python for Q…☆21Nov 18, 2025Updated 4 months ago
- ☆18Apr 13, 2023Updated 2 years ago
- ll In One Tool For Info Gathering, SQL Vulnerability Scannig and Crawling☆14Jun 10, 2017Updated 8 years ago
- Just a bunch of useful scripts for netsec/admin/others☆16Dec 9, 2025Updated 3 months ago
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆87Mar 20, 2025Updated last year
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- ☆25Nov 16, 2023Updated 2 years ago
- ☆19Nov 28, 2024Updated last year
- subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.☆14Sep 17, 2025Updated 6 months ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- Seecurity helper tool to detect entry points of WordPress plugins☆10May 16, 2024Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25May 6, 2024Updated last year
- Grab form parameters easily☆14Dec 11, 2024Updated last year
- to find shell backdoor in website☆17Jun 3, 2023Updated 2 years ago
- LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs☆233Apr 5, 2025Updated 11 months ago