Offensive Security recon tool
☆91Aug 27, 2021Updated 4 years ago
Alternatives and similar repositories for sharingan
Users that are interested in sharingan are comparing it to the libraries listed below
Sorting:
- Web application recon for bug bounty☆21Apr 19, 2020Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- A tool to do basic fingerprinting across a large number of hosts☆11Oct 20, 2020Updated 5 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆213Jun 23, 2020Updated 5 years ago
- A Payload Injector for bugbounties written in go☆70Jul 18, 2020Updated 5 years ago
- Enumerate a target Based off of Nmap Results☆76Oct 25, 2023Updated 2 years ago
- Web Application Vulnerability Scanner☆133Sep 25, 2020Updated 5 years ago
- Webshell, Virtual Private Server (VPS) and cPanel Database☆39Sep 2, 2022Updated 3 years ago
- Simple command shell collections☆35Mar 7, 2021Updated 5 years ago
- public dns server list for dmut project☆18Nov 30, 2023Updated 2 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Dec 23, 2024Updated last year
- Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security prof…☆417Nov 24, 2020Updated 5 years ago
- ☆90Aug 5, 2023Updated 2 years ago
- Tool to brute website sub-domains and dirs.☆49May 13, 2020Updated 5 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆289Apr 24, 2023Updated 2 years ago
- A very fast and smart web directory and file enumeration tool written in C.☆141Sep 15, 2025Updated 6 months ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Hunt down the secrets from the WebArchives for Fun and Profit☆163Dec 8, 2022Updated 3 years ago
- Search engine scraper tool with BASH script.☆83Jan 28, 2020Updated 6 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Jun 2, 2016Updated 9 years ago
- WRecon, is a tool for the recognition of vulnerabilities and blackbox information for wordpress.☆19Nov 30, 2022Updated 3 years ago
- ☆46Mar 20, 2021Updated 5 years ago
- whoareyou is a tool to find the underlying technology/software used in a list of websites passed through stdin (using Wappalyzer dataset)☆32Jun 15, 2020Updated 5 years ago
- Common Web Managers Fuzz Wordlists☆176Jan 2, 2026Updated 2 months ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- Test the speed and reliability of a list of DNS servers☆22Dec 9, 2020Updated 5 years ago
- Network footprint scanner platform. Discover domains and run your custom checks periodically.☆429Apr 22, 2022Updated 3 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆16Mar 31, 2021Updated 4 years ago
- Bugbounty scope tool☆332Mar 5, 2025Updated last year
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Oct 22, 2020Updated 5 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Script en Bash que automatiza todos los pasos para retransmitir la solicitud de autenticación SMB con el objetivo de obtener una Shell.☆23Jul 16, 2025Updated 8 months ago
- Advanced Recon Tool☆26Aug 24, 2020Updated 5 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 8 months ago