benbusby / namebusterLinks
A tool for enumerating usernames from text, files, or websites
☆82Updated 3 years ago
Alternatives and similar repositories for namebuster
Users that are interested in namebuster are comparing it to the libraries listed below
Sorting:
- ☆56Updated 2 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆62Updated 3 years ago
- Yet another content discovery tool☆119Updated 10 months ago
- ☆74Updated last year
- It's a simple tool for test vulnerability shellshock☆118Updated 4 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆106Updated last year
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆108Updated 9 months ago
- A WLAN red team framework.☆157Updated 11 months ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆68Updated 4 years ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆97Updated 3 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 5 years ago
- Wordlists handcrafted (and automated) with ♥☆217Updated last month
- Linux Persistence Toolkit☆66Updated 2 years ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- Chrome and Firefox extension that lists Amazon S3 Buckets while browsing☆125Updated last month
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.com☆106Updated 3 years ago
- Automatically run and save ffuf scans for multiple IPs☆81Updated last year
- PyIntruder: A Python fuzzer boasting multithreading for accelerated performance, a user-friendly tkinter GUI interface, and a wide array …☆58Updated 3 years ago
- Target practice for ffuf☆67Updated 4 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated last month
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆28Updated last year
- OWASP based Web Application Security Testing Checklist☆78Updated last year
- This project is aimed at freely providing technical guides on various hacking tools.☆119Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆162Updated last month
- ☆66Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Mobile Application Vulnerability Scanner☆25Updated 6 months ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆126Updated 3 years ago