leobeosab / sharinganLinks
Offensive Security recon tool
☆92Updated 3 years ago
Alternatives and similar repositories for sharingan
Users that are interested in sharingan are comparing it to the libraries listed below
Sorting:
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆37Updated 5 years ago
- ☆47Updated 4 years ago
- Unique wordlist generator of unique wordlists.☆42Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- ⚡️ Multiple target ZAP Scanning☆104Updated last year
- Another Subdomain ENumeration Tool☆12Updated 2 years ago
- Tool to find SMTP servers vulnerable to open relay☆80Updated 5 years ago
- REST API backend for Reconmap☆47Updated last week
- Search (offline) if your password (NTLM or SHA1 format) has been leaked (HIBP passwords list v8)☆60Updated 10 months ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- ☆38Updated 4 years ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆53Updated last month
- An epic web shell☆85Updated last month
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆43Updated 5 months ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- ☆28Updated 6 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆102Updated 4 years ago
- Turn your VPS into an attack box☆35Updated last year
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆46Updated 2 years ago
- A docker image which will enumerate, sort, unique and resolve the results of various subdomains enumeration tools.☆72Updated 11 months ago