gnothiseautonlw / vulnfetcher
Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is able to process large lists of packages or services on it's own. It supports a simple search, nmap xml's, tab-separated files and debian packages list files ('dpkg -l > file')
☆17Updated 4 years ago
Alternatives and similar repositories for vulnfetcher:
Users that are interested in vulnfetcher are comparing it to the libraries listed below
- Information-Gathering Shell Script☆29Updated 4 years ago
- A set of tools, procedures, and playbooks for performing bug bounties☆15Updated 6 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated last year
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago
- Rockyou for web fuzzing☆14Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 7 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated 2 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆13Updated 3 months ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated last month
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆38Updated 6 months ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Updated 2 years ago
- Spaghetti - Web Application Security Scanner☆19Updated 7 years ago
- Steal Apache Solr instance Queries with or without a username and password.☆12Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- web application pentesting tools for docker☆17Updated 2 years ago
- A collection of hacks and one-off scripts☆18Updated 3 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- Gampung tools for find nuclei template from github☆10Updated last year
- Notes and Commands for CTFs☆22Updated 4 years ago
- DNSrecon tool with GUI for Kali Linux☆57Updated 2 years ago
- crawl a website for links and expose all the vulnerable parameters.☆12Updated 2 years ago
- ☆40Updated last year
- Fetch & Filter Known URLs☆15Updated 2 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆39Updated last year
- Subdomain Bruteforce - Bounty Quick Code☆30Updated 6 months ago