Fuzz for hidden proxies, vhosts, and URLs
☆15Apr 1, 2026Updated last month
Alternatives and similar repositories for webspray
Users that are interested in webspray are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15Jan 9, 2019Updated 7 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆18Mar 25, 2023Updated 3 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆150Apr 1, 2026Updated last month
- gtfobin checker☆11Oct 25, 2020Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Cross Site Scripting ( XSS ) Vulnerability Payload List☆23Feb 23, 2021Updated 5 years ago
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆81Apr 1, 2026Updated last month
- Sniper. Passive Secrets Hunting.🚬☆13Jun 3, 2022Updated 3 years ago
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- Collection of offensive tools targeting Microsoft Azure☆222Apr 1, 2026Updated last month
- Tool to find stored robots.txt files from the past☆19Jun 4, 2023Updated 2 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Jan 7, 2018Updated 8 years ago
- Tools for bug hunting in a container☆21Aug 18, 2023Updated 2 years ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆28Mar 11, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Python3 Ebowla... 3Bowla☆17Jan 7, 2020Updated 6 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- Tool for performing lots of DNS queries quickly☆18May 29, 2015Updated 10 years ago
- Ethical Hacking Roadmap 🌐🔒☆11Dec 19, 2023Updated 2 years ago
- A modular pentesting framework implemented in C☆13Aug 6, 2018Updated 7 years ago
- Collect OSINT from git repositories☆18Apr 6, 2021Updated 5 years ago
- New way to write Markdown☆11Dec 14, 2024Updated last year
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆12Jul 10, 2021Updated 4 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆50Feb 2, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- OSINT automation for hackers.☆24Jun 27, 2023Updated 2 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆27Apr 1, 2026Updated last month
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Sep 2, 2020Updated 5 years ago
- Reverse And Dorking Tools☆26Apr 30, 2021Updated 5 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Aug 1, 2021Updated 4 years ago
- Fire and forget password cracking and complexity analysis.☆35Jan 4, 2016Updated 10 years ago
- Bug Bounty & Other Stuff☆59Dec 16, 2021Updated 4 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Gatekeeper: Long Range RFID Stealing and Cloning☆19Apr 16, 2024Updated 2 years ago
- R interface to the Censys "cyber"/scans search engine • https://www.censys.io/tutorial☆14Aug 9, 2022Updated 3 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆14Aug 7, 2019Updated 6 years ago
- ☆13Dec 10, 2023Updated 2 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Feb 4, 2021Updated 5 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆21Oct 20, 2023Updated 2 years ago
- Tool made to inject malicious code inside a legitimate apk in order to gain access to the infected device.☆18Jul 21, 2024Updated last year