cc1a2b / PenHunterLinks
Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it automates the process of collecting subdomains and URLs and tests them for various vulnerabilities including XSS, SQL Injection, Local File Inclusion, Open Redirect, Server-Side Request Forgery, CSRF, and RCE.
☆20Updated 5 months ago
Alternatives and similar repositories for PenHunter
Users that are interested in PenHunter are comparing it to the libraries listed below
Sorting:
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆42Updated last year
- Extracts URLs from OSINT Archives for Security Insights☆115Updated 2 weeks ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 9 months ago
- Here are some cool and some unpublished Dorks☆75Updated 4 months ago
- CLI tool for fetching URLs from Wayback Machine, Common Crawl, and VirusTotal.☆36Updated 6 months ago
- This script Crawl the website and find the urls that contains html forms.☆70Updated 11 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆56Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 6 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆70Updated 4 months ago
- Tool for automate bug hunting process 🔍 --> 🍭☆41Updated 10 months ago
- Bug Bounty ultimate tool☆20Updated 6 months ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆44Updated 9 months ago
- ☆37Updated 2 months ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated 5 months ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Updated 7 months ago
- ☆65Updated last year
- CrlfiX☆19Updated 4 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- ☆27Updated 11 months ago
- reverse engineered and improved BSQLi script from Coffinxp☆12Updated 9 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆53Updated 5 months ago
- Passive Web Vulnerability Detection Tool☆33Updated last month
- AI/LLM local model integration for analysis of reconftw results☆58Updated last month
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆115Updated 5 months ago
- Automated way to extract juicy info with subfinder and waybackurls☆34Updated 2 weeks ago
- A passive way to find backups/ sensitive information.☆80Updated 2 weeks ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆60Updated 3 months ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆61Updated 7 months ago
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆190Updated 6 months ago
- ☆57Updated 9 months ago