genbounty / OCA-OffensiveCybersecurityAssistantLinks
ChatGPT terminal assistant with a good memory to be used in ethical hacking, offensive cybersecurity and red teaming. **Warning:** These scripts are for training purposes to accompany a training course. Do not use on real applications without explicit permissions.
☆10Updated last year
Alternatives and similar repositories for OCA-OffensiveCybersecurityAssistant
Users that are interested in OCA-OffensiveCybersecurityAssistant are comparing it to the libraries listed below
Sorting:
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Updated last year
- Burp extension used to snip any header from all the requests.☆23Updated 2 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Updated 11 months ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Updated 2 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Updated 5 years ago
- this nuclei template finds back up files☆22Updated 5 months ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Updated last year
- Subdomains scanner Spider☆13Updated last year
- Tool for fetching all the available waybackmachine snapshot urls☆24Updated last year
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- Looks for parameters in urls☆34Updated last year
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Updated 2 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Updated 3 years ago
- Manage attack surface data on Elasticsearch☆24Updated 2 years ago
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆12Updated last year
- ☆14Updated 10 months ago
- Monitor your target continuously for new subdomains!☆25Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 4 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated 2 years ago
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated 3 months ago
- CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)☆29Updated 2 years ago
- Template Nuclei SSTI☆34Updated 2 months ago
- ☆19Updated 2 years ago
- Find CVEs that don't have a Detectify modules.☆22Updated 2 years ago
- Find subdomains by searching public certificate records☆16Updated last year
- ☆13Updated 2 years ago
- Programs I Made while learning python for pentesters.☆20Updated 3 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated 2 years ago