Grep Web pages with extra features like JS deobfuscation and OCR
☆111Dec 3, 2023Updated 2 years ago
Alternatives and similar repositories for webgrep
Users that are interested in webgrep are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Apr 22, 2022Updated 3 years ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Crystal Anti-Exploit Protection 2012☆37May 31, 2020Updated 5 years ago
- Fast Endpoint Scanner☆55Dec 23, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Extract relative urls from a heap snapshot☆87May 30, 2021Updated 4 years ago
- stdin writes to slack☆14Feb 8, 2020Updated 6 years ago
- A library for patching ELFs☆62Dec 4, 2020Updated 5 years ago
- ☆14Dec 6, 2023Updated 2 years ago
- Scraping creds using Github API and truffleHog☆11Dec 13, 2023Updated 2 years ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 2 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Dec 23, 2022Updated 3 years ago
- Scripts to extract files from SCM directories left on web servers☆36Jun 19, 2023Updated 2 years ago
- Application for logging HTTP and DNS Requests☆15May 14, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Python3 Websocket AND http proxy☆43Dec 18, 2022Updated 3 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆39Feb 14, 2026Updated last month
- A place to store my own wordlists, and link to others that are useful☆108Nov 15, 2023Updated 2 years ago
- CLI tool that extracts a regex pattern from a list of urls ( Rust )☆61Sep 14, 2022Updated 3 years ago
- Make concurrent requests with the curl command-line tool☆76Oct 9, 2019Updated 6 years ago
- Tracks runtime instruction execution in Linux programs☆36Aug 25, 2013Updated 12 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- A tool to automate the boring process of APK recon☆344Sep 30, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 🐰 Managing command snippets for hackers/bug bounty hunters. with pet.☆107May 6, 2023Updated 2 years ago
- A script to automatically list visually indistinguishable permutations of domain names using IDN and punycode.☆21May 29, 2017Updated 8 years ago
- Second-order subdomain takeover scanner☆403Aug 28, 2025Updated 7 months ago
- Get the scope of your bugcrowd programs☆67Dec 4, 2020Updated 5 years ago
- A reverse whois tool based on Whoxy API.☆170Mar 31, 2024Updated last year
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆178Nov 10, 2022Updated 3 years ago
- ☆13Aug 13, 2019Updated 6 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 6 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆13Dec 29, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆322Sep 23, 2022Updated 3 years ago
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- Fetch web pages using headless Chrome, storing all fetched resources including JavaScript files. Run arbitrary JavaScript on many web pag…☆529Apr 23, 2025Updated 11 months ago
- A database for storing, querying and doing stats on credential leaks☆40May 23, 2023Updated 2 years ago
- 🔭 Collection of regexp pattern for security passive scanning☆116Feb 18, 2023Updated 3 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago