Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it automates the process of collecting subdomains and URLs and tests them for various vulnerabilities including XSS, SQL Injection, Local File Inclusion, Open Redirect, Server-Side Request Forgery, CSRF, and RCE.
☆27May 4, 2026Updated 2 weeks ago
Alternatives and similar repositories for PenHunter
Users that are interested in PenHunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extends Model Context Protocol (MCP) to local LLMs via Ollama, enabling Claude-like tool use (files, web, email, GitHub, AI images) while…☆26Jun 17, 2025Updated 11 months ago
- ☆16Jun 28, 2025Updated 10 months ago
- SpecOps is a Burp Suite extension that ingests an OpenAPI or Swagger spec and instantly builds a workbench to test every documented endpo…☆32Mar 27, 2026Updated last month
- Pentesting tool to automate common op tasks and organize discovered data.☆14Mar 26, 2026Updated last month
- This repository contains all the GF-Patterns Repositories. All we have to do is just to run the given Shell File and it's Done !!☆21Jun 28, 2025Updated 10 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Script to exploit Grafana CVE-2025-4123: XSS and Full-Read SSRF☆56Jul 28, 2025Updated 9 months ago
- TUI bash history for Linux in C (CLI)☆15Dec 1, 2024Updated last year
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆13Jan 7, 2025Updated last year
- VirtualBox Web Control Panel is a lightweight HTTP server script providing a simple web interface to list, control, and interact with Vir…☆25Apr 15, 2025Updated last year
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 3 years ago
- Automated way to extract juicy info with subfinder and waybackurls☆41Aug 24, 2025Updated 8 months ago
- Grab form parameters easily☆14Dec 11, 2024Updated last year
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- Most powerfull Wifi Jammier.with fixes.☆12Oct 14, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆47Sep 6, 2024Updated last year
- All in 1 phishing framework☆36Aug 20, 2022Updated 3 years ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆80Oct 2, 2025Updated 7 months ago
- This script checks the status of URLs to see if they are alive or not.☆13Nov 22, 2024Updated last year
- ☆12Jan 30, 2025Updated last year
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20May 24, 2019Updated 6 years ago
- This python based tool can be used to discover API keys, access tokens, and other sensitive data in JavaScript files. It can scan JavaScr…☆15Oct 18, 2024Updated last year
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆34May 15, 2026Updated last week
- ☆13Jul 8, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆15May 5, 2025Updated last year
- Javascript file change monitoring☆18Mar 13, 2026Updated 2 months ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Nov 26, 2024Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 3 years ago
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆62Jan 25, 2026Updated 3 months ago
- XSS scanner tool to scan a list of URLs provided in a .txt file for reflected XSS(rxss) vulnerabilities. This tool is designed to efficie…☆14Jun 29, 2024Updated last year
- Visually inspect JSON data from the terminal☆35Oct 25, 2025Updated 6 months ago
- A collection of BASH-Python scripts for different scenarios using loops, field processors and clever commands.☆33Jun 25, 2018Updated 7 years ago
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- All the free ebooks I've found online about hacking and such. Everyone should have access to these.....☆15Nov 30, 2018Updated 7 years ago
- some cheat sheet for bash & etc.☆14Jul 18, 2023Updated 2 years ago
- YouTube History Analyzer☆37Mar 27, 2026Updated last month
- Common AWS configs for plugins☆14Updated this week
- Metasploit module for CVE-2025-24071 - Windows NTLM Hash Leak via .library-ms☆25Mar 18, 2025Updated last year
- Automate Lynis Fixes☆10May 14, 2026Updated last week
- ☆17Sep 15, 2023Updated 2 years ago