benbusby / namebusterLinks
A tool for enumerating usernames from text, files, or websites
☆82Updated 3 years ago
Alternatives and similar repositories for namebuster
Users that are interested in namebuster are comparing it to the libraries listed below
Sorting:
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆64Updated 3 years ago
- ☆58Updated 3 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- CLI & library to search for default credentials among thousands of Products / Vendors☆69Updated 4 years ago
- A WLAN red team framework.☆154Updated last year
- Yet another content discovery tool☆120Updated last year
- Extract credentials and other useful info from network captures☆75Updated 3 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆96Updated 4 years ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆54Updated 10 months ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 5 years ago
- It's a simple tool for test vulnerability shellshock☆117Updated 4 years ago
- Linux Persistence Toolkit☆72Updated 3 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Magicspoofing it's a python script that checks & test SPF/DMARC DNS records an tries to spoof a domain with a open relay mail system.☆53Updated 9 months ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated last year
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 4 months ago
- OWASP based Web Application Security Testing Checklist☆81Updated last year
- ☆74Updated last week
- ☆66Updated 2 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- Information-Gathering Shell Script☆29Updated 5 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 3 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆28Updated 7 months ago
- Red Team tools, infrastructure, and hardware weaponized☆110Updated 2 months ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago