cc1a2b / PenHunterLinks
Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it automates the process of collecting subdomains and URLs and tests them for various vulnerabilities including XSS, SQL Injection, Local File Inclusion, Open Redirect, Server-Side Request Forgery, CSRF, and RCE.
☆21Updated last year
Alternatives and similar repositories for PenHunter
Users that are interested in PenHunter are comparing it to the libraries listed below
Sorting:
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆243Updated last year
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆53Updated last year
- Extracts URLs from OSINT Archives for Security Insights☆173Updated last week
- Here are some cool and some unpublished Dorks☆81Updated last year
- This repository contains all the GF-Patterns Repositories. All we have to do is just to run the given Shell File and it's Done !!☆21Updated 7 months ago
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆131Updated last year
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆199Updated 6 months ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆66Updated 8 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆55Updated last year
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆263Updated last year
- Automated way to extract juicy info with subfinder and waybackurls☆40Updated 5 months ago
- CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.☆35Updated 4 months ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆244Updated last week
- Discovering Typo Squatting on your domains!☆81Updated last year
- ☆23Updated 10 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Updated last month
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆76Updated last year
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Updated 7 months ago
- Tool for automate bug hunting process 🔍 --> 🍭☆47Updated 7 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆225Updated 5 months ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆47Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆170Updated 10 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆154Updated 4 months ago
- Pentesting tool to automate common op tasks and organize discovered data.☆13Updated last month
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Updated last year
- ☆88Updated 4 months ago
- automated Open Source Intelligence gathering☆182Updated 2 months ago
- BookMark and Find Subdomains, Endpoints, External Domains in your web browser.☆28Updated 6 months ago
- AI/LLM local model integration for analysis of reconftw results☆91Updated 9 months ago
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆262Updated 7 months ago