Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it automates the process of collecting subdomains and URLs and tests them for various vulnerabilities including XSS, SQL Injection, Local File Inclusion, Open Redirect, Server-Side Request Forgery, CSRF, and RCE.
☆21Dec 10, 2024Updated last year
Alternatives and similar repositories for PenHunter
Users that are interested in PenHunter are comparing it to the libraries listed below
Sorting:
- ☆16Jun 28, 2025Updated 8 months ago
- Pentesting tool to automate common op tasks and organize discovered data.☆13Dec 23, 2025Updated 2 months ago
- TUI bash history for Linux in C (CLI)☆15Dec 1, 2024Updated last year
- This repository contains all the GF-Patterns Repositories. All we have to do is just to run the given Shell File and it's Done !!☆21Jun 28, 2025Updated 8 months ago
- VirtualBox Web Control Panel is a lightweight HTTP server script providing a simple web interface to list, control, and interact with Vir…☆25Apr 15, 2025Updated 10 months ago
- Plugins for extending OpenCost with new Custom Cost Sources☆27Apr 3, 2025Updated 11 months ago
- Bug Bounty ultimate tool☆29Dec 3, 2025Updated 3 months ago
- A collection of BASH-Python scripts for different scenarios using loops, field processors and clever commands.☆33Jun 25, 2018Updated 7 years ago
- YouTube History Analyzer☆37Jan 31, 2026Updated last month
- VMware Products License Keys☆11Feb 22, 2025Updated last year
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆34Sep 26, 2025Updated 5 months ago
- Visually inspect JSON data from the terminal☆35Oct 25, 2025Updated 4 months ago
- A Linux CLI tool for physical and network drive information☆66Dec 6, 2025Updated 2 months ago
- Cisco IOS Security Inspector☆39Dec 29, 2025Updated 2 months ago
- Разные полезные скрипты для работы в Linux, на Python и на bash, сброс ключей IDE от JetBrains для бесплатного использования.☆44Sep 23, 2021Updated 4 years ago
- Automated way to extract juicy info with subfinder and waybackurls☆40Aug 24, 2025Updated 6 months ago
- Solo Leveling - Self-Improvement App is a gamified self-improvement application that transforms personal development into an immersive RP…☆28Jan 11, 2026Updated last month
- Web Recon Tool 🔍 An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information …☆25Feb 23, 2026Updated last week
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 5 months ago
- ☆10Jul 29, 2023Updated 2 years ago
- The Huawei Watchface Extractor is a Python script that allows you to extract images from HWT or com.huawei.watchface files. It can be use…☆11Sep 17, 2023Updated 2 years ago
- All in 1 phishing framework☆36Aug 20, 2022Updated 3 years ago
- Script to exploit Grafana CVE-2025-4123: XSS and Full-Read SSRF☆55Jul 28, 2025Updated 7 months ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- List of VMWare License Keys☆10Jun 11, 2023Updated 2 years ago
- This script checks the status of URLs to see if they are alive or not.☆13Nov 22, 2024Updated last year
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆75Oct 2, 2025Updated 5 months ago
- Shell Utils is an educational framework designed to make shell programming accessible and powerful. It is the result of extensive work ov…☆13Updated this week
- Esta es una extensión del proyecto original de Avilla Forensics☆12Nov 18, 2025Updated 3 months ago
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆13Aug 20, 2024Updated last year
- osquery Foundation Charter, Legal, and Process Documents☆13Jun 10, 2022Updated 3 years ago
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆25Jan 27, 2025Updated last year
- Azure Command-Line Interface☆11Dec 10, 2023Updated 2 years ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Aug 4, 2025Updated 6 months ago
- grafana, prometheus, alertmanager, node-exporter, cadvisor, alertmanager-bot for telegram in docker-compose and awesome grafana dashbord☆11Apr 19, 2023Updated 2 years ago
- A repository dedicated to deliver a comprehensive set of tools for integration and convenient use of Kaspersky Threat Intelligence servic…☆21Dec 17, 2025Updated 2 months ago
- Trusty Dependency Risk Action☆10Feb 12, 2025Updated last year