jayateertha043 / WebDirScanLinks
WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & directories recursively. It's written in Go and it's capable of multithreaded scanning.
☆11Updated 2 years ago
Alternatives and similar repositories for WebDirScan
Users that are interested in WebDirScan are comparing it to the libraries listed below
Sorting:
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- Tools used for Pentesting☆21Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated 2 years ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆18Updated 2 years ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆19Updated 5 months ago
- ☆25Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆97Updated last week
- Subtron is a professional-grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆23Updated last month
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 3 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- Fast Path Traversal exploitation tool☆21Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- ☆43Updated 5 months ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Updated 2 years ago
- ☆24Updated last year
- A small executable to trick a user to authenticate using code matching MFA☆69Updated 2 years ago
- ☆29Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Updated last year
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆21Updated 2 years ago