drtychai / penumLinks
Parallelized enumeration tool for red team engagements and bug bounty programs.
☆17Updated 4 years ago
Alternatives and similar repositories for penum
Users that are interested in penum are comparing it to the libraries listed below
Sorting:
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- ☆36Updated 9 months ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 4 years ago
- Python script to launch burp scans automatically☆33Updated 4 years ago
- Default plugins for Jaeles Scanner☆35Updated 5 years ago
- Query various sources for CVE proof-of-concepts☆51Updated 2 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- Validate proxies for specific domain☆37Updated 4 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Updated last year
- A Burp Suite extension for headless, unattended scanning.☆37Updated 5 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆37Updated last year
- ☆26Updated 3 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 3 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- A tools for JavaScript Recon☆25Updated 5 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Updated 4 years ago
- Attempt zone transfers on domains☆18Updated 4 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Updated 5 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Updated 2 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆34Updated 4 years ago
- Related subdomains finder☆30Updated 3 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 5 years ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 3 years ago
- A BurpSuite plugin for BBRF☆25Updated 11 months ago
- Pythonize Intruder Payload☆13Updated 4 years ago