ivan-sincek / file-scraperLinks
Scrape files for sensitive information, and generate an interactive HTML report. Based on Rabin2.
☆16Updated 4 months ago
Alternatives and similar repositories for file-scraper
Users that are interested in file-scraper are comparing it to the libraries listed below
Sorting:
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Updated last year
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆160Updated last year
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've …☆61Updated 7 months ago
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆44Updated last year
- A powerful Go tool for finding origin IPs of domains by querying multiple security APIs and validating results with built-in HTTP client.☆42Updated 2 months ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆57Updated last year
- My personal collection of nuclei templates made for fuzzing.☆29Updated last year
- Many script that can be modified according to your needs for Information Gathering and Asset discovery in Bug Bounty Hunting (Pull reques…☆60Updated last year
- Cross Injector — A Python Script for Cross-Site Scripting (XSS) Detection☆41Updated 5 months ago
- Chrome extension tool for OSINT & Recon☆57Updated last year
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆116Updated 2 weeks ago
- Find secrets and passwords in container images and file systems☆15Updated 3 years ago
- Some Dorking resources☆38Updated last year
- The Primate Pack is a suite of extensions for Caido.☆14Updated last year
- simple recon tool to help you for searching vulnerability on web server☆75Updated last month
- Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)☆77Updated last year
- Cloning apk for bypassing code tampering detection, Google Safety Net and scanning vulnerable plugins☆88Updated 2 years ago
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.☆73Updated last year
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Updated 6 months ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆47Updated last year
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆48Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- ☆42Updated last year
- Passive Web Vulnerability Detection Tool☆37Updated 9 months ago
- CloudFlare-IP is a tool which aims to gather origin IP of the website protected by Cloudflare from the website's favicon icon using Shoda…☆64Updated 6 years ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆45Updated 8 months ago
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆15Updated last year