WARF is a Web Application Reconnaissance Framework that helps to gather information about the target.
☆193Dec 27, 2022Updated 3 years ago
Alternatives and similar repositories for warf
Users that are interested in warf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework☆171Feb 4, 2023Updated 3 years ago
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆82Sep 15, 2022Updated 3 years ago
- ☆28Sep 10, 2022Updated 3 years ago
- URL scanner for recon, vulnerabilities, secrets and more!☆12Sep 27, 2021Updated 4 years ago
- ☆1,114Jul 26, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆13Oct 24, 2024Updated last year
- Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live opera…☆18Jun 27, 2022Updated 3 years ago
- XSS Finder Via SSTI☆57Sep 14, 2023Updated 2 years ago
- tools to find xss in a website☆59Apr 27, 2022Updated 4 years ago
- Check AWS S3 instances for read/write/delete access☆121Feb 8, 2022Updated 4 years ago
- Pentesting automation platform that combines hacking tools to complete assessments☆525Updated this week
- port+dir+param bruteforcing at the same time using ffuf☆17Jul 27, 2024Updated last year
- Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to prevent targeted passw…☆33Mar 4, 2023Updated 3 years ago
- Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security prof…☆416Nov 24, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- PassLock is a highly secured password manager that encrypts passwords using Advanced Encryption Standards (AES)☆65Feb 5, 2024Updated 2 years ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆969May 21, 2025Updated last year
- Smart context-based SSRF vulnerability scanner.☆361May 5, 2022Updated 4 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- An XSS exploitation command-line interface and payload generator.☆1,420Jan 19, 2025Updated last year
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆1,173Jan 21, 2026Updated 4 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆384May 19, 2023Updated 3 years ago
- An online handy-recon tool☆259Nov 12, 2023Updated 2 years ago
- Awesome Bug bounty builder Project☆677Feb 15, 2023Updated 3 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 3 years ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆13Aug 8, 2023Updated 2 years ago
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- Filter URLs to save your time.☆60Jul 29, 2022Updated 3 years ago
- Automation Recon tool which works with Large & Medium scopes. It performs a lot of tasks and gets back all the results in separated files…☆684Jul 15, 2024Updated last year
- Useful "Match and Replace" burpsuite rules☆370Sep 26, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests w…☆635Updated this week
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Mar 18, 2023Updated 3 years ago
- ☆34May 24, 2023Updated 2 years ago
- scripts & notes☆13Nov 4, 2019Updated 6 years ago
- Automated Recon Tool Installer☆16Jun 29, 2022Updated 3 years ago
- Bash script for CTF automating basic enumeration☆41Mar 1, 2022Updated 4 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 4 years ago