infobyte / faraday-cliLinks
Faraday's Command Line Interface
☆50Updated this week
Alternatives and similar repositories for faraday-cli
Users that are interested in faraday-cli are comparing it to the libraries listed below
Sorting:
- Security tools report parsers for Faradaysec.com☆54Updated this week
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated last year
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated 9 months ago
- recon-ng modules for Censys☆37Updated last year
- Various XSL templates to manipulate data from NMap XML reports☆27Updated 6 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆67Updated 4 years ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 5 years ago
- NSE script which leverages the Censys Search API for passive data collection☆59Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- Extract credentials and other useful info from network captures☆70Updated 2 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 3 years ago
- Reconnaissance tool for GitLab and GitHub organizations☆50Updated last year
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Automated privilege escalation of the world's most popular Docker images.☆68Updated last year
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- A place to store my various pentesting related code thats too small/niche to justify its own repository, and a simple website with notes …☆38Updated this week
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆105Updated 6 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- Scan DockerHub images that match a keyword to find secrets.☆60Updated 4 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆101Updated 5 years ago