iknowjason / hammerLinks
An example of a mis-configured Rails application release under MIT license.
☆21Updated 2 years ago
Alternatives and similar repositories for hammer
Users that are interested in hammer are comparing it to the libraries listed below
Sorting:
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- InfoSec OpenAI Examples☆19Updated 2 years ago
- ☆90Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 3 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Jumpstart multiple WebSocket servers quickly☆32Updated 4 years ago
- Virtual Security Operations Center☆52Updated 2 years ago
- Most common AWS S3 bucket names.☆27Updated 5 years ago
- ☆30Updated 2 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated 2 weeks ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 5 years ago
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆51Updated this week
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Updated 4 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆69Updated 4 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- A collection of one off hacks and simple scripts☆28Updated 2 years ago
- New Framework Red Team Operations☆19Updated 4 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Updated 8 months ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- ☆21Updated 8 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- ☆60Updated 2 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- Validate proxies for specific domain☆38Updated 4 years ago
- REST API backend for Reconmap☆46Updated this week
- ☆24Updated 6 years ago
- Target practice for ffuf☆69Updated 4 years ago