gnothiseautonlw / vulnfetcher
Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is able to process large lists of packages or services on it's own. It supports a simple search, nmap xml's, tab-separated files and debian packages list files ('dpkg -l > file')
☆17Updated 4 years ago
Alternatives and similar repositories for vulnfetcher:
Users that are interested in vulnfetcher are comparing it to the libraries listed below
- Information-Gathering Shell Script☆29Updated 4 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated 2 years ago
- E-mails, subdomains and names Harvester - OSINT☆10Updated 5 years ago
- A set of tools, procedures, and playbooks for performing bug bounties☆15Updated 6 years ago
- SMTP Open Relay Exploitation☆13Updated 4 years ago
- Bash script to generate reverse shell payloads☆19Updated last year
- Rockyou for web fuzzing☆14Updated 3 years ago
- XSS payloads for exploiting Markdown syntax☆7Updated 4 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆20Updated last year
- King of Bug Bounty Tips Simple Tool☆12Updated 3 years ago
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆9Updated 2 years ago
- Fetch & Filter Known URLs☆15Updated 2 years ago
- VLAN attacks toolkit☆14Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- Steal Apache Solr instance Queries with or without a username and password.☆12Updated 3 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated last year
- ☆40Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated last month
- Notes and Commands for CTFs☆22Updated 4 years ago
- Spaghetti - Web Application Security Scanner☆19Updated 7 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆18Updated 4 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Script Recon Bug Bounty☆10Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆19Updated 2 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆13Updated 3 months ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆38Updated 6 months ago