☆192Oct 12, 2022Updated 3 years ago
Alternatives and similar repositories for node-dirbuster
Users that are interested in node-dirbuster are comparing it to the libraries listed below
Sorting:
- A wordlist for brute forcing directories / files☆10Jul 7, 2015Updated 10 years ago
- IrisCTF 2023 challenges.☆16Jan 23, 2023Updated 3 years ago
- dirbuster-ng is C CLI implementation of the Java dirbuster tool☆356Jul 19, 2020Updated 5 years ago
- A logging DNS and HTTP(S) server. Opensource alternative to some parts of the Burpsuite Collaborator server.☆38Nov 11, 2017Updated 8 years ago
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆11Dec 9, 2024Updated last year
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆17Oct 8, 2016Updated 9 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- a net scanner for nodejs☆10Feb 18, 2016Updated 10 years ago
- Scan for evidence of CVE-2021-30860 (FORCEDENTRY) exploit☆11Sep 21, 2021Updated 4 years ago
- Exploits for different vulnerabilities☆13Nov 29, 2021Updated 4 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆13Aug 9, 2020Updated 5 years ago
- English subtitles for the TV series "Hackad"☆11May 18, 2023Updated 2 years ago
- This script can be used by Frida to hijack SSL context and okhttp CertificateBuilder☆11Dec 31, 2020Updated 5 years ago
- Qakbot Registry Key Configuration Decryptor☆14Dec 20, 2021Updated 4 years ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- Clone of the original project https://sourceforge.net/projects/sqsh/☆14Dec 8, 2023Updated 2 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- Forensic tool for examining Thumbs.db files☆14Jun 5, 2013Updated 12 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Jenkins plug-in that defines an API to mine and analyze data from a source control repository☆17Updated this week
- Web Fuzzer☆435Sep 4, 2023Updated 2 years ago
- ☆18Dec 12, 2022Updated 3 years ago
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- Collection of username lists for enumerating kerberos domain users☆108Dec 18, 2017Updated 8 years ago
- Directory/File, DNS and VHost busting tool written in Go☆13,462Updated this week
- Fortigate Log Parser☆16Dec 28, 2025Updated 2 months ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆81Nov 24, 2025Updated 3 months ago
- A yara based MCP Server☆22Feb 23, 2026Updated last week
- Python tool for large scale git analysis. Inspired by gitrob.☆21Jun 12, 2020Updated 5 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated last year
- ☆22Nov 12, 2022Updated 3 years ago
- davtest (improved)- Exploits WebDAV folders☆120Mar 7, 2023Updated 2 years ago
- PowerShell script that decrypts password entries from a Passwordstate server.☆26Feb 17, 2026Updated last week
- HITCON 2023 x DEVCORE Wargame☆22Aug 24, 2023Updated 2 years ago
- A Real-Time Monitoring Tool for BitTorrent DHT Traffic☆30May 5, 2018Updated 7 years ago
- Extracts fields from zeek logs, compatible with zeek-cut☆26Jul 10, 2024Updated last year
- ☆21Oct 22, 2019Updated 6 years ago