joda32 / CertCrunchyView external linksLinks
Just a silly recon tool that uses data from SSL Certificates to find potential host names
☆29May 22, 2023Updated 2 years ago
Alternatives and similar repositories for CertCrunchy
Users that are interested in CertCrunchy are comparing it to the libraries listed below
Sorting:
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 3 months ago
- Lama, the application that does not mache these words.☆23Jun 9, 2019Updated 6 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Listing subdomains about a main domain☆58May 9, 2018Updated 7 years ago
- This tool helps you pentest THE PAST of a website.☆15Jul 13, 2025Updated 7 months ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Utility script to test zip file upload functionality (and possible extraction of zip files) for vulnerabilities (aka Zip Slip)☆31May 31, 2019Updated 6 years ago
- Dr. Mine is a node script written to aid automatic detection of in-browser cryptojacking.☆49Feb 8, 2020Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- Joomla Vulnerability Component Scanner☆62Sep 28, 2018Updated 7 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- Centralized Firewall Control☆21Feb 5, 2018Updated 8 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- ☆25May 9, 2021Updated 4 years ago
- The burp extension to forward the request☆10Oct 21, 2024Updated last year
- ☆66Feb 10, 2018Updated 8 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Feb 18, 2023Updated 2 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Jun 26, 2021Updated 4 years ago
- An Advanced Web Crawler and DirBuster☆114Mar 9, 2022Updated 3 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Dec 24, 2018Updated 7 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆111Oct 11, 2018Updated 7 years ago
- Still in dev mode☆12Apr 24, 2018Updated 7 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 7 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- ☆16May 9, 2016Updated 9 years ago
- Essential tool for finding blind injection attacks.☆50Feb 6, 2019Updated 7 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Lightweight utility to fool port scanners☆32Feb 28, 2020Updated 5 years ago
- Vulnerability scanner based on vulners.com audit API☆65Jul 25, 2018Updated 7 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆80Jul 29, 2022Updated 3 years ago