cmlh / rockspiderLinks
Creates the initial scope of files and directories/folders of a web site for Spiders/Robots/Crawlers
☆16Updated 11 years ago
Alternatives and similar repositories for rockspider
Users that are interested in rockspider are comparing it to the libraries listed below
Sorting:
- a collection of payloads for common webapps☆73Updated 12 years ago
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆96Updated 2 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 5 years ago
- Web interface for recon-ng☆14Updated 9 years ago
- Scripts for Deploying new server☆48Updated 2 months ago
- Query Shodan and Censys data for fast parsing☆38Updated 6 years ago
- Listing subdomains about a main domain☆59Updated 7 years ago
- scripts for pentesting☆88Updated 6 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Updated 6 years ago
- A lightweight CSRF Toolkit for easy Proof of concept☆174Updated 11 years ago
- VAPT is a Vulnerability Assessment and Penetration Testing toolkit -- a small collection of some of the common testing tools specifically…☆30Updated last month
- Automated XSS Finder☆63Updated 11 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated 2 years ago
- Script to automate, manage, and multithread Nikto scans.☆60Updated 5 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Updated last year
- Search drives for documents containing passwords☆63Updated 11 years ago
- Ruby based reverse IP-lookup tool.☆57Updated 4 years ago
- BurpSuite extension to assist with Automated Forced Browsing/Endpoint Enumeration☆23Updated 7 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆83Updated 2 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- My collection of nmap nse modules☆64Updated 5 years ago
- Vulnerability scanner based on vulners.com audit API☆64Updated 6 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆64Updated 9 years ago
- The Bi-directional Link Extractor.☆53Updated 8 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago