Web Crawler for Identifying Entry Points
☆11Mar 26, 2024Updated last year
Alternatives and similar repositories for entrypoint_enum
Users that are interested in entrypoint_enum are comparing it to the libraries listed below
Sorting:
- Wayfiles is a tool designed to search for juicy files and URLs within a folder/file with results of tools like gau, waymore, waybackurls,…☆16Feb 22, 2026Updated last month
- shamelessly ripped from https://github.com/khalilbijjou/WAFNinja/☆19Dec 16, 2016Updated 9 years ago
- These are my personal notes for everything I learned regarding hacking APIs. Enjoy.☆21Mar 4, 2024Updated 2 years ago
- اول اداة ددوس اتاك عربيه 🇱🇾☆25Jun 18, 2024Updated last year
- API fuzzer that exposes security flaws by sending malformed inputs☆16Sep 4, 2024Updated last year
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆36Nov 24, 2024Updated last year
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆14Nov 1, 2024Updated last year
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆16Jul 11, 2025Updated 8 months ago
- ☆19Dec 1, 2025Updated 3 months ago
- A tool to monitor for potential spear phishing domains and send to Slack.☆23Feb 8, 2024Updated 2 years ago
- ☆13Sep 28, 2024Updated last year
- AEM Dispatcher Security Scan☆18Dec 7, 2025Updated 3 months ago
- Python Penetration Testing Tools☆17Jul 19, 2025Updated 8 months ago
- ☆17May 1, 2025Updated 10 months ago
- Bug Bounty Recon Tools☆28Apr 13, 2024Updated last year
- ☆10Jan 26, 2023Updated 3 years ago
- ☆18Jul 26, 2021Updated 4 years ago
- A powerful tool designed for identifying hidden endpoints and sensitive information within JavaScript files on a website.☆30Oct 19, 2023Updated 2 years ago
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- ☆32Sep 13, 2022Updated 3 years ago
- BBT - Bug Bounty Tools☆18Apr 5, 2024Updated last year
- This Python script takes a hexadecimal string of digital binary data (from the two tracks of a debit card barcode) and obtains serial, ac…☆12Aug 4, 2020Updated 5 years ago
- Kali for Penetration Testers, by EC-Council☆13Jan 10, 2023Updated 3 years ago
- Network sniffing automation with Bettercap as rogue AP or as client in your network☆25May 30, 2022Updated 3 years ago
- HuntersEye is designed for Bug Bounty Hunters, and Security Researchers to monitor new subdomains and certificates for specified domains.…☆21Dec 29, 2023Updated 2 years ago
- Multithread reverse shell listener☆26Feb 10, 2024Updated 2 years ago
- All In One Tools Hacking☆27Jul 2, 2019Updated 6 years ago
- ☆41Updated this week
- Simple script to get your private/public or both programs using the Hackerone graphql.☆22Jan 24, 2020Updated 6 years ago
- an exploit of Server-side request forgery (SSRF)☆53Aug 2, 2024Updated last year
- A proof-of-concept for ransomware encryption☆18Nov 29, 2025Updated 3 months ago
- A solid recon tool I use personally.☆30May 12, 2023Updated 2 years ago
- Tweezer tool for tweezing tool to collect juicy information from files☆17Jan 10, 2025Updated last year
- A web browser for accessing I2P network anonymously and securely☆25Oct 12, 2023Updated 2 years ago
- ☆53Oct 10, 2023Updated 2 years ago
- A multi coroutine concurrent batch URL survival detection tool written in Go, with concurrency determined by CPU by default.一个go编写的多协程并发批…☆12Jan 9, 2024Updated 2 years ago
- ☆14Feb 7, 2026Updated last month
- Download files out of open AWS buckets☆38Dec 12, 2018Updated 7 years ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆55Dec 23, 2024Updated last year