d4rckh / gorilla
tool for generating wordlists or extending an existing one using mutations.
☆385Updated last month
Alternatives and similar repositories for gorilla
Users that are interested in gorilla are comparing it to the libraries listed below
Sorting:
- ☆378Updated last year
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆433Updated last year
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,018Updated 6 months ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆465Updated 8 months ago
- ☆425Updated 8 months ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆169Updated 3 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆266Updated 2 years ago
- Just an AV slayer. Nothing special ;)☆214Updated 2 years ago
- Http request smuggling vulnerability scanner☆227Updated 2 years ago
- Nuclei templates for honeypots detection.☆196Updated last year
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆395Updated 4 months ago
- Vaf is a cross-platform very advanced and fast web fuzzer written in nim☆321Updated 2 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆300Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆550Updated 5 months ago
- A RedTeam Toolkit☆397Updated last month
- ☆521Updated last year
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆671Updated 3 weeks ago
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆393Updated 3 months ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆330Updated 2 months ago
- Distribute ordinary bash commands over many systems☆165Updated 2 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 3 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆867Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated last week
- Pentest Report Generator☆407Updated this week
- a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust☆352Updated 3 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆488Updated 2 years ago
- Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework☆167Updated 2 years ago
- Wordlists handcrafted (and automated) with ♥☆219Updated 2 months ago
- A python tool to automate KeePass discovery and secret extraction.☆486Updated 5 months ago
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆167Updated last year