gsvprharsha / Hunter-Framework
A python based Framework for Ethical Hackers. Provides 6 different tools as of 31/01/2022.
☆13Updated 2 years ago
Alternatives and similar repositories for Hunter-Framework
Users that are interested in Hunter-Framework are comparing it to the libraries listed below
Sorting:
- Burpsuite Plugin to bypass strict RePlay protection☆12Updated 4 years ago
- This page should help you with the recon for security issues.☆21Updated 2 years ago
- It finds Subject Alternative Names for a given list of domains☆8Updated 3 years ago
- My fuzz repo!☆22Updated last year
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Updated 2 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- parse ffuf & map endpoints to wordlists☆20Updated 4 years ago
- [experiment] Generate Nuclei templates for CVEs using chatGPT☆18Updated 6 months ago
- Rockyou for web fuzzing☆14Updated 3 years ago
- ☆21Updated 4 years ago
- Web based favicon recon tool made using streamlit.☆9Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- ☆14Updated last month
- Simple tools to handle string and generate subdomain permutations☆15Updated 2 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆12Updated 2 years ago
- Perform OSINT on external targets using Shodan☆22Updated last year
- Subdomain Scan (knockpy) in Python3☆12Updated 4 years ago
- This repository is a collection of Awesome XSS Payloads in 1 txt file☆12Updated 5 years ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆13Updated last year
- Collections of way to evade normal detection events.☆24Updated 4 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last month
- huntr.dev public disclosures/hacktivity watcher☆16Updated last year
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆36Updated last year
- ./kumasia php simple backdoor☆22Updated 3 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes☆17Updated 2 years ago
- (Mass) Mining parameters from dark corners of Web Archives☆1Updated last year
- Extracting api keys and secrets by requesting each url at the your list.☆17Updated 10 months ago
- ☆11Updated 4 months ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago