codingo / Minesweeper
A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
☆201Updated 3 years ago
Alternatives and similar repositories for Minesweeper:
Users that are interested in Minesweeper are comparing it to the libraries listed below
- The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/The…☆35Updated 4 years ago
- search for hosts info with shodan☆231Updated 3 years ago
- Tool made to automate tasks of pentesting.☆165Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- Collect information about email addresses from Pastebin☆35Updated 3 years ago
- An OSINT tool to find contacts in order to report security vulnerabilities.☆268Updated 5 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- myBFF - a Brute Force Framework☆140Updated 3 weeks ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆102Updated 7 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆226Updated 6 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆166Updated 5 years ago
- Collection of social engineering payloads☆296Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 6 years ago
- A simple XSS finding tool☆109Updated 6 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆275Updated 4 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆155Updated 5 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆171Updated last year
- ☆150Updated last year
- Twitter Back From The Dead looks in a user tweets history for domain names that are available for registration☆217Updated 7 months ago
- Abusing Self-XSS and Clickjacking to trigger XSS☆132Updated 8 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆92Updated 8 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆147Updated 7 years ago
- ⚠️WARNING: This project now become part of https://github.com/j3ssie/Metabigor project☆176Updated 5 years ago
- Passive Vulnerability Auditor☆132Updated 8 years ago
- penetration testing scripts☆136Updated 5 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago