blacklanternsecurity / bbot-module-playground
A proving grounds for young and aspiring BBOT modules
☆13Updated 2 years ago
Alternatives and similar repositories for bbot-module-playground:
Users that are interested in bbot-module-playground are comparing it to the libraries listed below
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆9Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- ☆9Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Updated 2 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆16Updated 3 years ago
- Rockyou for web fuzzing☆14Updated 2 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated 2 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated last year
- ☆34Updated 6 years ago
- Find open databases - Powered by Binaryedge.io☆12Updated 5 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- Wordlist generator☆16Updated 4 years ago
- ☆28Updated last year
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Perform OSINT on external targets using Shodan☆21Updated 11 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆16Updated 2 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- ☆11Updated 2 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆32Updated this week
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 6 months ago
- Burp Suite extension for extracting metadata from files☆19Updated 4 years ago
- Quickly discover exposed hosts on the internet using multiple search engine.☆9Updated 2 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 8 months ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 4 years ago
- ☆17Updated last year
- Miscellaneous tools for BloodHound☆18Updated 2 years ago