anmolksachan / ThreatTracerLinks
ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F
☆137Updated 5 months ago
Alternatives and similar repositories for ThreatTracer
Users that are interested in ThreatTracer are comparing it to the libraries listed below
Sorting:
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆102Updated 4 months ago
- ☆65Updated 2 years ago
- ☆78Updated 2 years ago
- ☆55Updated last year
- Automate Scoping, OSINT and Recon assessments.☆99Updated 3 weeks ago
- A compilation of important commands, files, and tools used in Pentesting☆51Updated 2 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆91Updated 6 months ago
- Challenge Python☆19Updated 2 years ago
- Red Team Guides☆142Updated last year
- Red Teaming tools and techniques☆55Updated 2 years ago
- ☆25Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year
- ☆95Updated 7 months ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆30Updated 2 years ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆103Updated 2 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆211Updated 2 months ago
- A simple pentest container equipped with common python pentest tools.☆42Updated last week
- Web Hacking and Red Teaming MindMap☆75Updated this week
- This repository contains information on the CVEs I found.☆50Updated last year
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆130Updated 10 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆78Updated last year
- This is an AD pentest tools collection☆59Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆153Updated last month
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆52Updated 3 years ago
- ☆47Updated 8 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆131Updated last year
- Discovering Typo Squatting on your domains!☆78Updated last year
- 📲 Python project developed to help on the process of searching for vulnerabilities in Android mobile applications. It takes the APK file…☆134Updated last month
- Mining URLs from Wayback Machine for bug hunting/fuzzing/further probing☆55Updated 2 years ago
- Find CVEs associated to Linux and public exploits on github☆119Updated 7 months ago