jonaslejon / lolcrawlerLinks
Headless web crawler for bugbounty and penetration-testing/redteaming
☆40Updated last year
Alternatives and similar repositories for lolcrawler
Users that are interested in lolcrawler are comparing it to the libraries listed below
Sorting:
- security.txt collection of most popular world-wide domains☆54Updated last year
- Cross Site Scripting ( XSS ) Vulnerability Payload List☆23Updated 4 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated this week
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆13Updated 3 months ago
- A Python based scanner uses shodan-internetdb to scan the IP.☆31Updated 3 years ago
- Host Header Injection Scanner☆46Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated 8 months ago
- Filter URLs to save your time.☆60Updated 3 years ago
- Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web appl…☆26Updated 3 years ago
- Automate bug bounty recon using bash alias☆14Updated last year
- fsp - Firestore Database Vulnerability Scanner Using APKs☆64Updated 4 years ago
- Simple recon tool automates your recon process☆17Updated 2 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Updated 4 years ago
- This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save t…☆26Updated 11 months ago
- Web application recon for bug bounty☆22Updated 5 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆23Updated 2 years ago
- ☆38Updated 4 years ago
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆23Updated last month
- Spaghetti - Web Application Security Scanner☆20Updated 8 years ago
- The Multi-Tool Web application vulnerability scanner.☆53Updated 4 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Updated 3 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆39Updated 2 years ago
- Autorev.sh generates reverse shell codes for reverse shell . Supports linux and windows☆16Updated 3 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆69Updated 5 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated 11 months ago
- Pipe different tools with google dork Scanner☆57Updated 5 years ago
- xss vulnerability scanner and input fuzzing tool.☆63Updated 2 years ago