Grep Web pages with extra features like JS deobfuscation and OCR
☆111Dec 3, 2023Updated 2 years ago
Alternatives and similar repositories for webgrep
Users that are interested in webgrep are comparing it to the libraries listed below
Sorting:
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Jan 28, 2021Updated 5 years ago
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Apr 22, 2022Updated 3 years ago
- Crystal Anti-Exploit Protection 2012☆37May 31, 2020Updated 5 years ago
- ☆13Aug 13, 2019Updated 6 years ago
- CLI tool that extracts a regex pattern from a list of urls ( Rust )☆61Sep 14, 2022Updated 3 years ago
- stdin writes to slack☆14Feb 8, 2020Updated 6 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- Extract relative urls from a heap snapshot☆87May 30, 2021Updated 4 years ago
- A place to store my own wordlists, and link to others that are useful☆108Nov 15, 2023Updated 2 years ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 2 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆38Feb 14, 2026Updated 3 weeks ago
- C# User Simulation☆33Oct 6, 2022Updated 3 years ago
- A script to automatically list visually indistinguishable permutations of domain names using IDN and punycode.☆21May 29, 2017Updated 8 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- Fast Endpoint Scanner☆55Dec 23, 2020Updated 5 years ago
- 🔭 Collection of regexp pattern for security passive scanning☆116Feb 18, 2023Updated 3 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆322Sep 23, 2022Updated 3 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Dec 23, 2022Updated 3 years ago
- A library for patching ELFs☆62Dec 4, 2020Updated 5 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Feb 4, 2021Updated 5 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- ☆105Oct 18, 2020Updated 5 years ago
- Fetch web pages using headless Chrome, storing all fetched resources including JavaScript files. Run arbitrary JavaScript on many web pag…☆529Apr 23, 2025Updated 10 months ago
- A database for storing, querying and doing stats on credential leaks☆39May 23, 2023Updated 2 years ago
- Turn your VPS into an attack box☆34Mar 17, 2024Updated last year
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Mar 3, 2026Updated last week
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Overlord - Red Teaming Infrastructure Automation☆628May 28, 2024Updated last year
- A reverse whois tool based on Whoxy API.☆170Mar 31, 2024Updated last year
- Source for tasks I have used with Covenant☆121Mar 21, 2021Updated 4 years ago
- Quick and dirty PoSH code to read teams messages☆23Feb 5, 2025Updated last year
- Cross Origin Resource Sharing MisConfiguration Scanner☆172Nov 17, 2021Updated 4 years ago
- ☆139Mar 29, 2023Updated 2 years ago
- ☆14Dec 6, 2023Updated 2 years ago
- PoC for CVE-2025-48384☆20Jul 9, 2025Updated 8 months ago
- ☆10Apr 10, 2024Updated last year
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated last month