hannob / snallygasterView external linksLinks
Tool to scan for secret files on HTTP servers
☆2,100Feb 4, 2026Updated last week
Alternatives and similar repositories for snallygaster
Users that are interested in snallygaster are comparing it to the libraries listed below
Sorting:
- A highly configurable Framework for easy automated web scanning☆381Jul 13, 2020Updated 5 years ago
- A Tool for Domain Flyovers☆5,896May 22, 2022Updated 3 years ago
- Analyze the security of any domain by finding all the information possible. Made in python.☆1,862Dec 29, 2022Updated 3 years ago
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,194Oct 24, 2018Updated 7 years ago
- DNS Rebinding Exploitation Framework☆495Apr 27, 2021Updated 4 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆401May 20, 2020Updated 5 years ago
- A default credential scanner.☆1,503Jul 8, 2025Updated 7 months ago
- UAC bypass, Elevate, Persistence methods☆2,736Feb 13, 2023Updated 3 years ago
- This tool can be used to brute discover GET and POST parameters☆1,390Aug 24, 2019Updated 6 years ago
- ☆2,315Dec 8, 2023Updated 2 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆2,089Jan 2, 2024Updated 2 years ago
- Command line utility for searching and downloading exploits☆1,811Sep 10, 2025Updated 5 months ago
- The Swiss Army knife for automated Web Application Testing☆2,324May 8, 2024Updated last year
- MSDAT: Microsoft SQL Database Attacking Tool☆980Aug 1, 2023Updated 2 years ago
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆2,998Dec 11, 2025Updated 2 months ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆470Nov 14, 2019Updated 6 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950May 8, 2019Updated 6 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]☆305Oct 14, 2018Updated 7 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,289Jul 10, 2024Updated last year
- A Powerful Subdomain Takeover Tool☆962Oct 17, 2023Updated 2 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,218Nov 20, 2025Updated 2 months ago
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆303Feb 12, 2023Updated 3 years ago
- Know the dangers of credential reuse attacks.☆2,087Dec 9, 2025Updated 2 months ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,484Oct 12, 2024Updated last year
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,295Dec 23, 2018Updated 7 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,283Aug 18, 2025Updated 5 months ago
- Incredibly fast crawler designed for OSINT.☆12,662Updated this week
- Reconnaissance tool for GitHub organizations☆6,135Sep 20, 2022Updated 3 years ago
- Automated Mass Exploiter☆5,208May 22, 2023Updated 2 years ago
- Find interesting Amazon S3 Buckets by watching certificate transparency logs.☆1,800Feb 28, 2025Updated 11 months ago
- A tool to capture all the git secrets by leveraging multiple open source git searching tools☆1,143Jun 25, 2019Updated 6 years ago
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)☆3,528Jul 21, 2025Updated 6 months ago
- A repository with 3 tools for pwn'ing websites with .git repositories available☆4,125Jun 14, 2023Updated 2 years ago
- Most advanced XSS scanner.☆14,735Apr 26, 2025Updated 9 months ago
- The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, su…☆3,679Feb 6, 2026Updated last week
- File upload vulnerability scanner and exploitation tool.☆3,300May 8, 2025Updated 9 months ago
- Windows passwords decryption from dump files☆511Feb 2, 2023Updated 3 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,468Jan 9, 2025Updated last year