Bug Bounty ultimate tool
β29Dec 3, 2025Updated 3 months ago
Alternatives and similar repositories for greaper
Users that are interested in greaper are comparing it to the libraries listed below
Sorting:
- Web Recon Tool π An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information β¦β25Feb 23, 2026Updated last week
- β28Nov 3, 2024Updated last year
- Simple python3 script to automate CVE-2018-9995β11Feb 20, 2024Updated 2 years ago
- Fback is a tool that helps you create target-specific wordlists using a .json pattern.β63Nov 21, 2025Updated 3 months ago
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it autβ¦β21Dec 10, 2024Updated last year
- β18Apr 26, 2025Updated 10 months ago
- This repository contains all the GF-Patterns Repositories. All we have to do is just to run the given Shell File and it's Done !!β21Jun 28, 2025Updated 8 months ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversalβ18May 7, 2024Updated last year
- β19Nov 28, 2024Updated last year
- DrShell is a cutting-edge tool designed for the dynamic management of reverse shell sessions. Whether you are a seasoned security professβ¦β16Aug 20, 2025Updated 6 months ago
- Project build for joel and joshua students from Germany | course: Advanced Tactics in information securityβ27Jan 21, 2025Updated last year
- Practical Bug Bounty Hunting for Hackers and Pentesters, by EC-Councilβ23Oct 6, 2021Updated 4 years ago
- Open Ai Chat GPT for python Toolsβ17Feb 8, 2023Updated 3 years ago
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to exploit a system or server that ruβ¦β18Jan 15, 2019Updated 7 years ago
- β18Apr 13, 2023Updated 2 years ago
- A quick bug bounty guide for beginnersβ91May 3, 2025Updated 10 months ago
- β147Jun 1, 2025Updated 9 months ago
- πΊ A map of OSINT tools.β19Jul 5, 2023Updated 2 years ago
- This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network securitβ¦β30Apr 10, 2024Updated last year
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a widβ¦β69Jul 25, 2023Updated 2 years ago
- β42Nov 19, 2025Updated 3 months ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their suβ¦β35Feb 20, 2024Updated 2 years ago
- A multi-threaded port scanner implementation in Pythonβ12May 30, 2023Updated 2 years ago
- β27Oct 27, 2025Updated 4 months ago
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible paβ¦β66Aug 15, 2024Updated last year
- CVE-2024-32640 | Automated SQLi Exploitation PoCβ77May 16, 2024Updated last year
- β11Jul 26, 2017Updated 8 years ago
- Tool Bash para automatizar y penetrar fallas de SQL en sitios webs.β28Jun 4, 2025Updated 9 months ago
- A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methodsβ¦β122Nov 11, 2024Updated last year
- Will attempt to retrieve DB details for FastAdmin instancesβ69Aug 20, 2024Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machineβ84Jan 6, 2023Updated 3 years ago
- A GUI based program for making customised crypto stealing malware written in pythonβ47Oct 8, 2025Updated 4 months ago
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.β31Feb 17, 2023Updated 3 years ago
- Windows Sovereignty Tool & Recall Mitigation Agent.β27Dec 19, 2025Updated 2 months ago
- Net Strike is a powerful multi-protocol DDoS tool written in Python. It uses IP spoofing for anonymity and maximizes attack speed with muβ¦β79May 24, 2025Updated 9 months ago
- Automation of some MAPT activities and interaction with the mobile Android device.β22Sep 28, 2025Updated 5 months ago
- All in 1 phishing frameworkβ36Aug 20, 2022Updated 3 years ago
- Python script implementing the favicon hash trick to find subdomains.β39Mar 28, 2023Updated 2 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.β35Nov 24, 2019Updated 6 years ago