Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain
☆50Feb 2, 2021Updated 5 years ago
Alternatives and similar repositories for web-hunter
Users that are interested in web-hunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Albatar is a SQLi exploitation framework in Python☆137Jan 24, 2025Updated last year
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- ☆13Oct 29, 2014Updated 11 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆87Dec 27, 2019Updated 6 years ago
- Show Exploit-Database With Static HTML Automatic Generate Everyday.☆13Jun 13, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆11Feb 20, 2015Updated 11 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- pArAnoIA - Tiny "Secure" Browser☆13Nov 2, 2024Updated last year
- Fuzz for hidden proxies, vhosts, and URLs☆15Apr 1, 2026Updated last month
- Python script to find subdomains☆11Aug 22, 2025Updated 8 months ago
- ☆19Aug 13, 2015Updated 10 years ago
- Misc Python tools or PoCs. Mainly focused in helping RE, fuzzing☆20Aug 31, 2012Updated 13 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- All my infosec notes I have been building up over the years☆337Apr 28, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 13 years ago
- Automated enumeration☆30Apr 14, 2021Updated 5 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- Create lists from nmap output.☆13Jan 27, 2021Updated 5 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- yellow pages email harvester☆15Jun 2, 2017Updated 8 years ago
- ☆27Apr 16, 2017Updated 9 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 12 years ago
- Small scripts to assist in pentesting☆19Feb 2, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Advanced Reconnaissance tool to enumerate attacking surface of the target☆11Oct 16, 2025Updated 6 months ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆13May 10, 2022Updated 3 years ago
- Compilation of commands for hacking tasks and security tools as a bit of everything☆15Apr 23, 2026Updated last week
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆83May 9, 2014Updated 11 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 7 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆55Dec 4, 2022Updated 3 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- A platform to create, catalog and deploy tests for tools such as Gauntlt, AttackIQ and Metasploit.☆17Jul 22, 2016Updated 9 years ago
- local mirror of your Github stars (including ALL branches)☆18Oct 7, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- Anonymous FTP Scanner Script- Generates IP's between two ranges, scans 21 and attempts a anonymous connection☆10Nov 23, 2014Updated 11 years ago
- X-wpbf is a wordpress bruteforce tool to find admin or user passwords via the admin login of the target website☆12Oct 16, 2025Updated 6 months ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Some Of MY TOOLS☆11Jul 4, 2024Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Apr 30, 2021Updated 5 years ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Feb 15, 2017Updated 9 years ago