ExtPenPy is a tool that will help you finalizing your recon phase faster.
☆17Dec 4, 2024Updated last year
Alternatives and similar repositories for ExtPenPy
Users that are interested in ExtPenPy are comparing it to the libraries listed below
Sorting:
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- A Python IDA Plugin that finds a route from one function to another.☆12Dec 6, 2018Updated 7 years ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆20Mar 22, 2025Updated 11 months ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 5 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 4 months ago
- ☆16Mar 3, 2025Updated last year
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13May 28, 2025Updated 9 months ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Sep 13, 2021Updated 4 years ago
- XSS漏洞与SSRF漏洞的联合攻击及其综合防范机制实验平台☆16Feb 14, 2025Updated last year
- ASN.1 parser used by PeNet do parse Authenticode signatures☆14Apr 11, 2025Updated 10 months ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Sep 29, 2022Updated 3 years ago
- A domain recon tool to help detect DNS based vulnerabilities, such as zone transfers and subdomain takeovers.☆11Mar 25, 2022Updated 3 years ago
- Extract domain from SSL Information☆15Nov 23, 2021Updated 4 years ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆20Jan 7, 2026Updated 2 months ago
- 按照会话解包, 然后提取明文txt信息, 让ChatGPT来判断一下是否存在攻击行为☆14Mar 7, 2023Updated 3 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Dec 8, 2025Updated 3 months ago
- system pseudo protocals digger for windows -- Windows 系统下的伪协议查看工具☆17Dec 22, 2016Updated 9 years ago
- Intercept Facebook network traffic on Android device☆21Feb 3, 2025Updated last year
- Generates permutations, alterations and mutations of subdomains. Auto Resolve what we find.☆11Dec 8, 2020Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Dec 3, 2014Updated 11 years ago
- MCP server for AdaptixC2☆27Jul 20, 2025Updated 7 months ago
- Bouncy Castle AES GCM Encryption☆17Mar 4, 2019Updated 7 years ago
- A native Mac App to manage your Github stars with custom tags, powered by SwiftUI and SQLite.☆22Aug 26, 2020Updated 5 years ago
- 短信接码工具☆15Jun 6, 2020Updated 5 years ago
- A fast generative fuzzer for HTTP☆16Nov 29, 2018Updated 7 years ago
- ☆18Jul 11, 2025Updated 7 months ago
- ☆25Feb 10, 2026Updated 3 weeks ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- UAdmin Phishlets for common sites☆16Jun 12, 2025Updated 8 months ago
- 一个Fuzzing服务器端模板注入漏洞的半自动化工具☆15Aug 4, 2016Updated 9 years ago
- 【原蚁逅平台1.0】 集在线WEBTOOLS、BLOG以及一款基于socket.io开发的全新XSS平台☆17Mar 6, 2016Updated 10 years ago
- Enumerate subdomains by parsing Rapid7 FDNS dumps and CA transparency logs☆26Apr 26, 2019Updated 6 years ago
- this repository made to help me All Dorking repositories find for one location☆36Aug 31, 2025Updated 6 months ago
- Python module to analyze devices connected to the router and alert accordingly.☆19Aug 16, 2023Updated 2 years ago
- BadGPT is a robust framework designed to simplify and optimize the bug bounty process. Equipped with a suite of tools for reconnaissance,…☆24Dec 1, 2024Updated last year