Python based Discord bot Which allows you to run tools like nmap and amass from discord
☆27Oct 23, 2022Updated 3 years ago
Alternatives and similar repositories for Astra-Bot
Users that are interested in Astra-Bot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Mar 18, 2023Updated 3 years ago
- ☆12Feb 18, 2022Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Aug 17, 2020Updated 5 years ago
- Rubidea - Bind XSS Server to Steal cookies.☆14May 2, 2020Updated 5 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- A powerful Burp extension to make bounty rain☆14Feb 1, 2022Updated 4 years ago
- A Cross-Platform Telegam Members Scraping and Adding Tool☆10May 27, 2021Updated 4 years ago
- I collected it to help the bug hunter get a reward☆56Sep 7, 2022Updated 3 years ago
- My GitHub profile☆11Feb 19, 2025Updated last year
- Web-based BashBunny IDE☆10Mar 16, 2018Updated 8 years ago
- Automate the process of an S3 bucket subdomain takeover via dangling CNAME record☆26May 20, 2024Updated last year
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Sep 6, 2021Updated 4 years ago
- BurpSiute - BurpBounty Profiles☆20Feb 10, 2023Updated 3 years ago
- Monitor websites for changes☆29Updated this week
- FireProx written in Go☆20Apr 13, 2024Updated last year
- A collection of GitHub dorks for bug bounty hunters☆18Jun 24, 2022Updated 3 years ago
- Burp extension to create target specific and tailored wordlist from burp history.☆256Dec 8, 2021Updated 4 years ago
- Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found☆341Nov 6, 2023Updated 2 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- Brute Force subdomains with a list of custom DNS records.☆13Feb 24, 2023Updated 3 years ago
- ☆17Dec 31, 2021Updated 4 years ago
- ☆56Jan 16, 2025Updated last year
- ☆41Aug 25, 2024Updated last year
- Your favourite chest/terminal bursting buddy!☆18Nov 27, 2021Updated 4 years ago
- Detecting leaked secrets, API keys, credentials, and sensitive files from public repositories in near real-time using the GitHub Events A…☆31May 1, 2025Updated 10 months ago
- ☆13Jul 13, 2023Updated 2 years ago
- Send notifications on different channels such as Slack, Telegram, Discord etc.☆39Jan 12, 2026Updated 2 months ago
- Generate phone numbers of any country for creating whatsapp groups to improve productivity☆11Jul 31, 2024Updated last year
- 计算ip范围,支持 cidr,ip-range 格式的输入☆23Sep 5, 2023Updated 2 years ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- Generador de diccionarios para ataques de fuerza bruta usando crunch.☆17Jun 26, 2020Updated 5 years ago
- OwOwning with the Windows API Examples and Code. DEFCON Furs 2020 presentation.☆13Jan 18, 2024Updated 2 years ago
- A small command-line utility to artificially limit the input rate to STDIN.☆18Feb 14, 2024Updated 2 years ago
- Let's code a Netflix Clone with GraphQL Pagination!☆24May 19, 2023Updated 2 years ago
- a .js scanner, built in php. designed to scrape urls and other info☆24Aug 22, 2017Updated 8 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- This is a beginner level session to train you into using SSH more effectively. While pentesters may benefit (especially if they are plan…☆15Feb 9, 2019Updated 7 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago