☆122Mar 27, 2017Updated 8 years ago
Alternatives and similar repositories for Pentest-Resources
Users that are interested in Pentest-Resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Fetch known urls from AlienVault's Open Threat Exchange for given hosts☆63Jul 22, 2019Updated 6 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆12Oct 16, 2017Updated 8 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]☆305Oct 14, 2018Updated 7 years ago
- Repo of useful scripts☆104Jun 30, 2020Updated 5 years ago
- differer finds how URLs are parsed by different languages in order to help bug hunters break filters☆63May 3, 2020Updated 5 years ago
- ☆28Sep 25, 2020Updated 5 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆363Mar 6, 2025Updated last year
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆135Jan 15, 2020Updated 6 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆116Mar 29, 2019Updated 6 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Sep 24, 2012Updated 13 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆159May 1, 2024Updated last year
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- ☆162Dec 7, 2017Updated 8 years ago
- A permutation generation tool written in golang☆210Jul 15, 2019Updated 6 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆19Jun 28, 2018Updated 7 years ago
- Automated client-side template injection (sandbox escape/bypass) detection for AngularJS v1.x.☆325Oct 20, 2021Updated 4 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Nov 12, 2014Updated 11 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Takes ip range, Scan all open SSL Certs, Grab Cnames☆113Sep 23, 2018Updated 7 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Script for monitoring changes in javascript files on WebApps for offensive reconnaissance.☆28Aug 4, 2021Updated 4 years ago
- Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT☆406Mar 19, 2026Updated last week
- A Go implementation of dirsearch.☆43Mar 10, 2019Updated 7 years ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆96Jun 5, 2021Updated 4 years ago
- A Burp Extension designed to identify argument injection vulnerabilities.☆123Apr 16, 2019Updated 6 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆13Feb 25, 2014Updated 12 years ago
- This tool can be used to brute discover GET and POST parameters☆1,396Aug 24, 2019Updated 6 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source c…☆563Aug 25, 2022Updated 3 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆97Jul 9, 2020Updated 5 years ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,136Dec 16, 2024Updated last year