cc1a2b / PenHunterLinks
Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it automates the process of collecting subdomains and URLs and tests them for various vulnerabilities including XSS, SQL Injection, Local File Inclusion, Open Redirect, Server-Side Request Forgery, CSRF, and RCE.
☆21Updated last year
Alternatives and similar repositories for PenHunter
Users that are interested in PenHunter are comparing it to the libraries listed below
Sorting:
- Extracts URLs from OSINT Archives for Security Insights☆170Updated this week
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆240Updated last year
- Here are some cool and some unpublished Dorks☆80Updated 11 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆54Updated last year
- This repository contains all the GF-Patterns Repositories. All we have to do is just to run the given Shell File and it's Done !!☆21Updated 6 months ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆66Updated 6 months ago
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆198Updated 4 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆50Updated last year
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆132Updated last year
- The Most Advanced Client-Side Prototype Pollution Scanner☆243Updated this week
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆224Updated 4 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆77Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆153Updated 3 months ago
- Tool for automate bug hunting process 🔍 --> 🍭☆46Updated 6 months ago
- Pentesting tool to automate common op tasks and organize discovered data.☆13Updated this week
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆48Updated last year
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆112Updated 3 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆74Updated 5 months ago
- BookMark and Find Subdomains, Endpoints, External Domains in your web browser.☆26Updated 4 months ago
- Automated way to extract juicy info with subfinder and waybackurls☆39Updated 4 months ago
- Discovering Typo Squatting on your domains!☆80Updated last year
- This script Crawl the website and find the urls that contains html forms.☆73Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆256Updated last year
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Updated last year
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆181Updated last year
- ☆20Updated 9 months ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆39Updated 5 months ago
- ☆23Updated 6 months ago
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆45Updated last year