hideckies / hackfruit
Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs, bug bounty, ethical hacking.
☆21Updated 2 years ago
Alternatives and similar repositories for hackfruit:
Users that are interested in hackfruit are comparing it to the libraries listed below
- Rockyou for web fuzzing☆15Updated 3 years ago
- King of Bug Bounty Tips Simple Tool☆12Updated 3 years ago
- xdebug 2.5.5 RCE exploit☆30Updated last month
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆37Updated 5 months ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆38Updated last year
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated 2 years ago
- An automated e-mail OSINT tool☆20Updated 2 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆16Updated 3 years ago
- World's most Powerful and Advanced Cross Site Scripting Software☆27Updated 5 years ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆14Updated 3 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆13Updated 2 years ago
- Repository of useful payloads and tips for pentesting/bug bounty.☆27Updated 3 months ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆14Updated 2 months ago
- Updated 6000 Sql Injection Google Dork 2021☆32Updated 3 years ago
- Find host header injections and perform Host Header attacks with other kind of bugs like web cache poisoning☆47Updated last year
- Web application pentesting recon☆23Updated 4 years ago
- ☆12Updated 2 years ago
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆22Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated 11 months ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- crawl a website for links and expose all the vulnerable parameters.☆13Updated 2 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆20Updated 3 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated last year
- Automate bug bounty recon using bash alias☆15Updated 6 months ago
- ☆22Updated last year
- A set of tools, procedures, and playbooks for performing bug bounties☆15Updated 6 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Updated 2 years ago