ExtPenPy is a tool that will help you finalizing your recon phase faster.
☆17Dec 4, 2024Updated last year
Alternatives and similar repositories for ExtPenPy
Users that are interested in ExtPenPy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Mar 3, 2025Updated last year
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- ☆25Feb 10, 2026Updated last month
- this repository made to help me All Dorking repositories find for one location☆36Aug 31, 2025Updated 6 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆14Nov 29, 2021Updated 4 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Sep 13, 2021Updated 4 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- BadGPT is a robust framework designed to simplify and optimize the bug bounty process. Equipped with a suite of tools for reconnaissance,…☆24Dec 1, 2024Updated last year
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- ☆26Feb 21, 2026Updated last month
- ASN.1 parser used by PeNet do parse Authenticode signatures☆14Apr 11, 2025Updated 11 months ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 5 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- S3 Recon tips and tricks collected from different resources,Sorry if i missed to mention all resources owners☆27Nov 13, 2021Updated 4 years ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆20Mar 22, 2025Updated last year
- A brief list of all the red teaming scenarios that can be easily used to validate your current company infrastructure. Scenarios are comp…☆17Jul 26, 2024Updated last year
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Dec 3, 2014Updated 11 years ago
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 3 years ago
- OAuth 2.0 exploitation, attack and research tools.☆13Jan 20, 2024Updated 2 years ago
- Bouncy Castle AES GCM Encryption☆17Mar 4, 2019Updated 7 years ago
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13May 28, 2025Updated 10 months ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆13Jan 15, 2026Updated 2 months ago
- Intercept Facebook network traffic on Android device☆20Feb 3, 2025Updated last year
- ☆18Jun 11, 2024Updated last year
- 12-week Geekwise course on web application security and hardening.☆17Mar 19, 2020Updated 6 years ago
- HackBar plugin for Burpsuite☆27Apr 15, 2021Updated 4 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 6 years ago
- Resources related to Hack The Box Meetup Zurich, CH☆15Jan 22, 2026Updated 2 months ago
- A simple command line tool which quickly audits the Disallow entries of a site's robots.txt.☆23Apr 5, 2023Updated 2 years ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Jul 9, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Demo files☆20Jun 3, 2022Updated 3 years ago
- A Python IDA Plugin that finds a route from one function to another.☆12Dec 6, 2018Updated 7 years ago
- ☆23Jun 30, 2021Updated 4 years ago
- Fast Path Traversal exploitation tool☆21Apr 19, 2024Updated last year
- system pseudo protocals digger for windows -- Windows 系统下的伪协议查看工具☆17Dec 22, 2016Updated 9 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated 2 weeks ago
- ☆28Mar 29, 2022Updated 4 years ago