koutto / jok3rLinks
Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
☆1,051Updated last year
Alternatives and similar repositories for jok3r
Users that are interested in jok3r are comparing it to the libraries listed below
Sorting:
- Mass scan IPs for vulnerable services☆1,034Updated 3 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,625Updated 6 months ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,253Updated 3 weeks ago
- HostHunter a recon tool for discovering hostnames using OSINT techniques.☆1,122Updated 2 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,712Updated 7 months ago
- Automatically Launch Google Hacking Queries Against A Target Domain☆727Updated last year
- fully automated pentesting tool☆511Updated 2 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,234Updated last year
- 🔎 shodansploit > v1.3.0☆534Updated 2 years ago
- OSINT tools and more but without API key☆1,344Updated last year
- AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.☆1,361Updated last year
- Find exploits in local and online databases instantly☆1,738Updated 3 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,157Updated 2 years ago
- Automated Red Team Infrastructure deployement using Docker☆1,243Updated 2 years ago
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,168Updated 11 months ago
- Collection of Scripts for shodan searching stuff.☆1,104Updated 6 months ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,822Updated 3 years ago
- Security Tool for Reconnaissance and Information Gathering on a website. (python 3.x)☆456Updated last year
- A default credential scanner.☆1,482Updated 3 years ago
- Striker is an offensive information and vulnerability scanner.☆2,285Updated 2 years ago
- Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.☆1,250Updated last month
- The Offensive Manual Web Application Penetration Testing Framework.☆1,827Updated 2 years ago
- Local file inclusion exploitation tool☆867Updated last year
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆633Updated 2 years ago
- Automatic Enumeration Tool based in Open Source tools☆928Updated last year
- Tools, scripts and tips useful during Penetration Testing engagements.☆627Updated 4 months ago
- ⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.☆803Updated last month
- Subdomain and target enumeration tool built for offensive security testing☆877Updated 11 months ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,214Updated 4 months ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,739Updated 4 months ago