Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain
☆50Feb 2, 2021Updated 5 years ago
Alternatives and similar repositories for web-hunter
Users that are interested in web-hunter are comparing it to the libraries listed below
Sorting:
- Albatar is a SQLi exploitation framework in Python☆137Jan 24, 2025Updated last year
- SSH, FTP and Telnet honeypots based on Twisted☆87Dec 27, 2019Updated 6 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- pArAnoIA - Tiny "Secure" Browser☆12Nov 2, 2024Updated last year
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Show Exploit-Database With Static HTML Automatic Generate Everyday.☆13Jun 13, 2021Updated 4 years ago
- Misc Python tools or PoCs. Mainly focused in helping RE, fuzzing☆20Aug 31, 2012Updated 13 years ago
- ☆13Oct 29, 2014Updated 11 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 12 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Jun 21, 2021Updated 4 years ago
- ☆11Feb 20, 2015Updated 11 years ago
- ☆19Aug 13, 2015Updated 10 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- Jaidam is an open source penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or j…☆84Mar 8, 2018Updated 7 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Library for Object Linking and Embedding (OLE) data types☆12Nov 27, 2025Updated 3 months ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Cross Site Scripting Cheat sheet.☆12Apr 3, 2021Updated 4 years ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Feb 15, 2017Updated 9 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 6 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆84May 9, 2014Updated 11 years ago
- The Zulu fuzzer☆124Sep 25, 2017Updated 8 years ago
- Flash ActionScript3 VM static analysis library based on Furnace framework.☆79May 30, 2013Updated 12 years ago
- Blind SQL injection exploitation tool written in ruby.☆99Dec 1, 2024Updated last year
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- Organise and access data collected during internal network pentests☆10Jun 4, 2020Updated 5 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.☆11Mar 29, 2017Updated 8 years ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- Python script to find subdomains☆11Aug 22, 2025Updated 6 months ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆13May 10, 2022Updated 3 years ago
- Hash Kit is tool Programmed by me . It consist of three sections : Encoding Hash , Decoding Hash , and Identifying Hash Id .☆12Dec 5, 2021Updated 4 years ago