leobeosab / sharinganLinks
Offensive Security recon tool
☆92Updated 3 years ago
Alternatives and similar repositories for sharingan
Users that are interested in sharingan are comparing it to the libraries listed below
Sorting:
- Another Subdomain ENumeration Tool☆12Updated 2 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- A Broken-URL Checker☆79Updated 7 years ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆52Updated 2 weeks ago
- Unique wordlist generator of unique wordlists.☆42Updated last year
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- REST API backend for Reconmap☆46Updated this week
- Information-Gathering Shell Script☆30Updated 4 years ago
- Tool to find SMTP servers vulnerable to open relay☆80Updated 5 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 3 years ago
- ☆38Updated 3 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- An epic web shell☆84Updated 4 months ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- Automatically run and save ffuf scans for multiple IPs☆79Updated last year
- Get all possible href | src | url from target url or domain☆41Updated 4 years ago
- ☆47Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Updated 4 years ago
- Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates being issued☆67Updated 2 years ago
- Automate Metasploit scanning and exploitation☆115Updated 8 months ago
- Pentest stuff☆49Updated last year
- A docker image which will enumerate, sort, unique and resolve the results of various subdomains enumeration tools.☆72Updated 10 months ago
- ⚡️ Multiple target ZAP Scanning☆104Updated last year
- A JavaScript components vulnerability scanner, based on RetireJS☆37Updated 4 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆103Updated 6 years ago
- Given a list of domains, you resolve them and get the IP addresses.☆48Updated 3 years ago