DeepWeb is a tool that extracts links from a webpage and does a deep analysis on every link.
☆26Jul 12, 2023Updated 2 years ago
Alternatives and similar repositories for DeepWeb
Users that are interested in DeepWeb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated enumeration for red teamers☆11Nov 22, 2022Updated 3 years ago
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆14Aug 8, 2024Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆22Feb 12, 2023Updated 3 years ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆23Aug 25, 2024Updated last year
- Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, ad…☆15Aug 22, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆101Aug 27, 2023Updated 2 years ago
- A tool for making python source difficult to read.☆16Sep 7, 2024Updated last year
- ☆194Jul 10, 2024Updated last year
- Escáner ofensivo web en Python: crawling, XSS, SQLi, headers y detección WAF con bypass por proveedor (--waf-xss).☆13Mar 25, 2026Updated 2 weeks ago
- Informatrion Gathering Framework☆23Aug 28, 2022Updated 3 years ago
- ☆25Jan 5, 2026Updated 3 months ago
- Web Security Scanner☆382Nov 13, 2025Updated 5 months ago
- recon for bug hunters☆879Mar 5, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 4 months ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- DroidSniper - Misconfigured Android Debug Bridge Scanner☆15Mar 26, 2024Updated 2 years ago
- Whitelists your CSS selectors based on your other files.☆13Sep 9, 2021Updated 4 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Access the query parameters of a URI, just like $_GET in PHP.☆18Jan 12, 2026Updated 3 months ago
- Angular UI component that represents an international payment card☆10Jan 7, 2024Updated 2 years ago
- A custom Cards Against Humanity generator☆13May 16, 2024Updated last year
- CUPP - Common User Passwords Profiler !☆15Jun 14, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- A script for installing custom patches in Ubuntu Touch devices.☆11Oct 7, 2025Updated 6 months ago
- Xninjaz is a powerful and versatile multi-vulnerability scanner designed to detect various web application vulnerabilities, including Loc…☆11Oct 16, 2025Updated 5 months ago
- BlackVenom is a personal project designed for ethical ARP and DNS spoofing 🛡️. It helps cybersecurity professionals practice network tra…☆23Jun 21, 2025Updated 9 months ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 4 years ago
- deface-X is an automatic deface tool used to inject a website☆13Oct 16, 2025Updated 5 months ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- Scans npmjs.org for npm packages that can be taken over☆19Jun 6, 2022Updated 3 years ago
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Jul 3, 2013Updated 12 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and reroutin…☆10Dec 23, 2014Updated 11 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- X-ddos666 is a Insane DDOS tool with HTTP/HTTPS PROXY REQUIREMENT {OVER 500 IP PROXY}☆13Oct 16, 2025Updated 5 months ago
- Basic bash scripts to install effortless, quickly to some installation for Debian after a Debian based install.☆11Feb 23, 2026Updated last month
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 9 years ago