leobeosab / sharinganLinks
Offensive Security recon tool
☆92Updated 4 years ago
Alternatives and similar repositories for sharingan
Users that are interested in sharingan are comparing it to the libraries listed below
Sorting:
- Unique wordlist generator of unique wordlists.☆42Updated 2 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆37Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- Enumerate a target Based off of Nmap Results☆79Updated last year
- Tool to find SMTP servers vulnerable to open relay☆82Updated 5 years ago
- ☆47Updated 4 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- ⚡️ Multiple target ZAP Scanning☆104Updated last year
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆46Updated 2 years ago
- A tool written in python for scraping firebase data☆43Updated 5 years ago
- REST API backend for Reconmap☆47Updated this week
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Updated 4 years ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆86Updated 2 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆101Updated 5 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- A tool to find redirection chains in multiple URLs☆80Updated 7 months ago
- Automate Metasploit scanning and exploitation☆116Updated last month
- Web application recon for bug bounty☆22Updated 5 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆44Updated 7 months ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Updated 2 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated 2 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆135Updated 3 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 5 years ago
- All in one port scanning script.☆68Updated 5 years ago
- Another Subdomain ENumeration Tool☆12Updated 2 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago