gnothiseautonlw / vulnfetcherLinks
Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is able to process large lists of packages or services on it's own. It supports a simple search, nmap xml's, tab-separated files and debian packages list files ('dpkg -l > file')
☆16Updated 5 years ago
Alternatives and similar repositories for vulnfetcher
Users that are interested in vulnfetcher are comparing it to the libraries listed below
Sorting:
- Information-Gathering Shell Script☆29Updated 5 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Updated 2 years ago
- Notes from OSCP, CTF, security adventures, etc...☆63Updated last year
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- Rockyou for web fuzzing☆15Updated 3 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆42Updated last year
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- 💣 Dockerized penetration-testing/bugbounty/app-sec testing environment☆33Updated 4 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆96Updated 4 years ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20Updated 5 years ago
- Repository of useful payloads and tips for pentesting/bug bounty.☆29Updated last year
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated 3 weeks ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆11Updated 7 months ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 5 years ago
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated last year
- Simple shell script for automated domain recognition with some tools☆20Updated 6 years ago
- Command Execution exploiter with an auto connection handling☆32Updated 3 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated 2 years ago
- Dehashed API CLI☆21Updated 5 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- A python approach to interacting with web shells.☆30Updated 4 years ago
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 4 years ago
- The DNS Hunt will make your life easier, and of course faster.☆47Updated 5 years ago
- Wordlist generator☆16Updated 5 years ago
- Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web appl…☆26Updated 2 months ago
- SMTP Open Relay Exploitation☆16Updated 5 years ago
- ☆19Updated 4 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 3 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆31Updated 4 years ago