☆122Mar 27, 2017Updated 9 years ago
Alternatives and similar repositories for Pentest-Resources
Users that are interested in Pentest-Resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 9 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Fetch known urls from AlienVault's Open Threat Exchange for given hosts☆63Jul 22, 2019Updated 6 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆12Oct 16, 2017Updated 8 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]☆304Oct 14, 2018Updated 7 years ago
- Repo of useful scripts☆104Jun 30, 2020Updated 5 years ago
- differer finds how URLs are parsed by different languages in order to help bug hunters break filters☆62May 3, 2020Updated 6 years ago
- ☆29Sep 25, 2020Updated 5 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆364Mar 6, 2025Updated last year
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆116Mar 29, 2019Updated 7 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Sep 24, 2012Updated 13 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆159May 1, 2024Updated 2 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- ☆162Dec 7, 2017Updated 8 years ago
- A permutation generation tool written in golang☆211Jul 15, 2019Updated 6 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆15Jul 1, 2020Updated 5 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆19Jun 28, 2018Updated 7 years ago
- Automated client-side template injection (sandbox escape/bypass) detection for AngularJS v1.x.☆323Oct 20, 2021Updated 4 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Nov 12, 2014Updated 11 years ago
- Takes ip range, Scan all open SSL Certs, Grab Cnames☆113Sep 23, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Script for monitoring changes in javascript files on WebApps for offensive reconnaissance.☆28Aug 4, 2021Updated 4 years ago
- A Go implementation of dirsearch.☆43Mar 10, 2019Updated 7 years ago
- Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT☆407Updated this week
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆96Jun 5, 2021Updated 4 years ago
- A Burp Extension designed to identify argument injection vulnerabilities.☆123Apr 16, 2019Updated 7 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This tool can be used to brute discover GET and POST parameters☆1,394Aug 24, 2019Updated 6 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source c…☆563Aug 25, 2022Updated 3 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆97Jul 9, 2020Updated 5 years ago
- ☆17Oct 15, 2017Updated 8 years ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,166Dec 16, 2024Updated last year