Directory/file & DNS busting tool written in Go
☆15Nov 26, 2019Updated 6 years ago
Alternatives and similar repositories for gobuster
Users that are interested in gobuster are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆22Jul 13, 2020Updated 5 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Mar 14, 2018Updated 8 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆12Apr 22, 2018Updated 8 years ago
- Personal fork of Kippo SSH honeypot.☆13May 25, 2014Updated 11 years ago
- Proof of concept that uses cosign and GitHub's in built OIDC for actions to sign container images, providing a proof that what is in the …☆14Jan 31, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions☆12Apr 24, 2017Updated 9 years ago
- Homemade scripts to-do various vulnerable challenges☆80Jan 7, 2021Updated 5 years ago
- ☆13Nov 5, 2017Updated 8 years ago
- Inline file transfer using in-built Windows tools (DEBUG.exe or PowerShell).☆319Apr 27, 2020Updated 6 years ago
- ☆22Apr 12, 2023Updated 3 years ago
- Plugin for keepnote to import a XML nmap file☆27Jul 8, 2016Updated 9 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Oct 7, 2013Updated 12 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- A collection of offensive tools I've hacked together for CTFs and such☆20Aug 9, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- LNHG - Mass Web Fingerprinter☆63Feb 22, 2016Updated 10 years ago
- A USB RUBBER DUCKY GUI! A RoR app as a simple GUI wrapper for the Duck Encoder. Have it configured to serve remotely and you have a way o…☆30Dec 11, 2014Updated 11 years ago
- INACTIVE - Experiment: A light-weight agent to get a port scan perspective into a useable place/format for security operations☆14Apr 10, 2023Updated 3 years ago
- AWS Cloud Lab is aims to facilitate educators using AWS in their teaching. Using AWS, teacher can create the tailor made lab environment …☆20Oct 12, 2017Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- Talk "Homographs, a history" or "Homographs, Attack!"☆13Jul 13, 2018Updated 7 years ago
- Red Team AI prompts☆49Dec 2, 2025Updated 5 months ago
- A brute-forcing delta robot☆28Sep 17, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Personal Collection of Operating Systems Scripts☆573May 16, 2024Updated last year
- A Proof of Concept for the POODLE vulnerability in SSLv3☆78Oct 9, 2015Updated 10 years ago
- Free KeyLogger for Kali Linux and Ubuntu☆37Feb 21, 2016Updated 10 years ago
- Javascript file change monitoring☆18Mar 13, 2026Updated last month
- ☆15Apr 20, 2026Updated 2 weeks ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- A simple SOCKS5 server written in Go☆31Nov 7, 2016Updated 9 years ago
- Metasploit Framework☆26Feb 10, 2026Updated 2 months ago
- Solidity smart contract for atomic swaps.☆10Oct 31, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Fingerprint a web app using local files as the fingerprint sources☆39May 16, 2017Updated 8 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆11Dec 4, 2018Updated 7 years ago
- Windows 10 simulation in HTML, CSS, and JavaScript☆26Jun 18, 2018Updated 7 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- Hardhat made easy with a flexible CLI to help run test, deploy and more.☆10Apr 10, 2024Updated 2 years ago
- Shodan HQ nmap plugin - passively scan targets☆157Mar 14, 2016Updated 10 years ago
- Python SQL injection framework☆132Nov 8, 2021Updated 4 years ago