leobeosab / sharinganLinks
Offensive Security recon tool
☆91Updated 4 years ago
Alternatives and similar repositories for sharingan
Users that are interested in sharingan are comparing it to the libraries listed below
Sorting:
- A JavaScript components vulnerability scanner, based on RetireJS☆37Updated 5 years ago
- Unique wordlist generator of unique wordlists.☆41Updated 2 years ago
- ☆46Updated 4 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 5 years ago
- Enumerate a target Based off of Nmap Results☆76Updated 2 years ago
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 5 years ago
- Information-Gathering Shell Script☆29Updated 5 years ago
- REST API backend for Reconmap☆46Updated this week
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆41Updated 5 years ago
- Web application recon for bug bounty☆20Updated 5 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- ⚡️ Multiple target ZAP Scanning☆105Updated 2 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Another Subdomain ENumeration Tool☆13Updated 3 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆67Updated 4 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Search (offline) if your password (NTLM or SHA1 format) has been leaked (HIBP passwords list v8)☆59Updated last year
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Updated 10 months ago
- A tool written in python for scraping firebase data☆44Updated 5 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated 2 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆46Updated 2 years ago
- Subdomain Enumeration Wordlist. 8956437 unique words. Updated.☆75Updated 5 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆133Updated 4 years ago
- Turn your VPS into an attack box☆34Updated last year
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Updated 4 years ago
- Common Wordlists☆54Updated 9 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago