cc1a2b / PenHunterLinks
Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it automates the process of collecting subdomains and URLs and tests them for various vulnerabilities including XSS, SQL Injection, Local File Inclusion, Open Redirect, Server-Side Request Forgery, CSRF, and RCE.
☆21Updated 11 months ago
Alternatives and similar repositories for PenHunter
Users that are interested in PenHunter are comparing it to the libraries listed below
Sorting:
- Here are some cool and some unpublished Dorks☆79Updated 9 months ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆236Updated last year
- This repository contains all the GF-Patterns Repositories. All we have to do is just to run the given Shell File and it's Done !!☆21Updated 4 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆44Updated last year
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆196Updated 3 months ago
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆130Updated 10 months ago
- Extracts URLs from OSINT Archives for Security Insights☆170Updated 2 weeks ago
- ☆16Updated 7 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆54Updated 10 months ago
- Discovering Typo Squatting on your domains!☆78Updated last year
- The Most Advanced Client-Side Prototype Pollution Scanner☆241Updated 3 weeks ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆74Updated 3 months ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆49Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆78Updated last year
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆66Updated 5 months ago
- Automated way to extract juicy info with subfinder and waybackurls☆38Updated 2 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆123Updated 10 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆250Updated 10 months ago
- Tool for automate bug hunting process 🔍 --> 🍭☆46Updated 4 months ago
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆263Updated 4 months ago
- ☆40Updated last year
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆45Updated last year
- Pentesting tool to automate common op tasks and organize discovered data.☆12Updated 3 weeks ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆159Updated 7 months ago
- ☆66Updated 2 years ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆153Updated last month
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Updated last year
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆131Updated last year
- All-sources tool to search websites by favicons☆176Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 11 months ago