codingo / Minesweeper
A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
☆202Updated 3 years ago
Alternatives and similar repositories for Minesweeper
Users that are interested in Minesweeper are comparing it to the libraries listed below
Sorting:
- Tool made to automate tasks of pentesting.☆165Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆275Updated 4 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆227Updated 7 years ago
- myBFF - a Brute Force Framework☆140Updated 2 months ago
- Automates some pentest jobs via nmap xml file☆324Updated 6 years ago
- search for hosts info with shodan☆230Updated 3 years ago
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆148Updated 7 years ago
- Collection of social engineering payloads☆296Updated 7 years ago
- Offensive tools as Dockerfiles. Lightweight & Ready to go☆205Updated 6 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆155Updated 5 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆166Updated 5 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 6 years ago
- Advanced Hash Manipulation☆178Updated 5 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆254Updated 10 months ago
- Collect information about email addresses from Pastebin☆35Updated 3 years ago
- WIreless Hacking Tools☆163Updated 11 years ago
- ☆193Updated 6 years ago
- Web recon tool (find temporary files, parse robots.txt, search some folders, google dorks and search domains hosted on same server)☆104Updated 8 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆102Updated 7 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆157Updated last year
- Note: Going through a full re-write of the tooling so the current versions in the repo do not work!☆404Updated 4 years ago
- Subdomain brute force focused on speed and data serialization☆74Updated 2 years ago
- Local File Inclusion Exploitation Tool (mirror)☆125Updated 8 years ago
- Twitter Back From The Dead looks in a user tweets history for domain names that are available for registration☆220Updated 9 months ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 6 years ago
- Passive Vulnerability Auditor☆133Updated 8 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- VPN pentest tools and scripts☆126Updated 7 years ago