dstotijn / hettyLinks
An HTTP toolkit for security research.
☆6,969Updated 4 months ago
Alternatives and similar repositories for hetty
Users that are interested in hetty are comparing it to the libraries listed below
Sorting:
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application☆4,763Updated 6 months ago
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for att…☆5,251Updated this week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆23,654Updated last week
- A Workflow Engine for Offensive Security☆5,652Updated last month
- A versatile and portable proxy for capturing, manipulating, and replaying HTTP/HTTPS traffic on the go.☆2,866Updated 2 months ago
- 🔥 Web-application firewalls (WAFs) from security standpoint.☆6,706Updated 7 months ago
- Real-time HTTP Intrusion Detection☆3,055Updated last year
- Scanning APK file for URIs, endpoints & secrets.☆5,323Updated 2 months ago
- An OOB interaction gathering server and client library☆3,813Updated this week
- Fast passive subdomain enumeration tool.☆11,830Updated this week
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆5,920Updated last month
- httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.☆8,590Updated last week
- 🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.☆4,336Updated this week
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆7,978Updated 3 months ago
- Fast web fuzzer written in Go☆14,119Updated last month
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,924Updated last year
- A collection of custom security tools for quick needs.☆3,214Updated 2 years ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,117Updated 3 weeks ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,708Updated 11 months ago
- In-depth attack surface mapping and asset discovery☆13,135Updated this week
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆10,296Updated this week
- Next generation web scanner☆5,927Updated 11 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆6,368Updated 2 weeks ago
- A next-generation crawling and spidering framework.☆13,827Updated this week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆17,724Updated 2 weeks ago
- The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, su…☆3,487Updated 2 months ago
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.☆3,899Updated 3 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,301Updated this week
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,240Updated 8 months ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,401Updated 5 months ago