blackhatethicalhacking / Nucleimonst3rLinks
Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs and exploits but also gather all the technology running behind them for further investigation for a potential target.
☆254Updated 5 months ago
Alternatives and similar repositories for Nucleimonst3r
Users that are interested in Nucleimonst3r are comparing it to the libraries listed below
Sorting:
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆298Updated last year
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆152Updated 9 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆125Updated last year
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆351Updated last year
- Shodan Dorks 2023☆238Updated 8 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆76Updated last year
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆236Updated last year
- TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in you…☆279Updated last year
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆259Updated 2 months ago
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆149Updated last year
- Shodan Dorks☆444Updated 7 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆201Updated 3 weeks ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆145Updated 11 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆54Updated 8 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆123Updated 8 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆233Updated 8 months ago
- AutoRecon-XSS is a script designed for automated reconnaissance of XSS vulnerabilities. It crawls the target URL or alive domains, extrac…☆134Updated last year
- ☆78Updated 2 years ago
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆130Updated 8 months ago
- Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not☆458Updated 3 weeks ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆54Updated 8 months ago
- Search & Parse Password Leaks☆388Updated 11 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated last year
- ☆314Updated last year
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆245Updated 2 months ago
- Docker - Ubuntu with a bunch of PenTesting tools and wordlists☆279Updated 6 months ago
- Here are the most interesting Shodan dorks (according to me)☆88Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆170Updated 2 weeks ago
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆192Updated last month
- A Personal Collection of Infosec Dorks☆201Updated 2 years ago