gnothiseautonlw / vulnfetcher
Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is able to process large lists of packages or services on it's own. It supports a simple search, nmap xml's, tab-separated files and debian packages list files ('dpkg -l > file')
☆17Updated 4 years ago
Alternatives and similar repositories for vulnfetcher:
Users that are interested in vulnfetcher are comparing it to the libraries listed below
- Information-Gathering Shell Script☆29Updated 4 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated this week
- Notes and Commands for CTFs☆22Updated 4 years ago
- A set of tools, procedures, and playbooks for performing bug bounties☆15Updated 6 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆13Updated 3 months ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated 2 years ago
- Gampung tools for find nuclei template from github☆10Updated last year
- Top password lists generated from leaks collected from different paste sites☆30Updated 2 years ago
- Automate bug bounty recon using bash alias☆14Updated 7 months ago
- King of Bug Bounty Tips Simple Tool☆12Updated 3 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Updated 2 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated last year
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- Bash script to generate reverse shell payloads☆19Updated last year
- E-mails, subdomains and names Harvester - OSINT☆10Updated 5 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆20Updated last year
- A python script to IDOR exploration☆41Updated 4 years ago
- Extract data from a .git directory.☆13Updated 2 years ago
- Quickly discover exposed hosts on the internet using multiple search engine.☆9Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆22Updated last year
- Pentesting notes☆17Updated last month
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated 9 months ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆18Updated 4 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆8Updated 3 years ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago