[EN] BETA: Layla - recon tool for bug bounty
☆75Feb 9, 2022Updated 4 years ago
Alternatives and similar repositories for Layla
Users that are interested in Layla are comparing it to the libraries listed below
Sorting:
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆19May 19, 2023Updated 2 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection☆32Jul 31, 2023Updated 2 years ago
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 3 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆111Dec 16, 2024Updated last year
- Automate Auxiliary Module in Metasploit☆17Apr 18, 2021Updated 4 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- ☆28Sep 10, 2022Updated 3 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆58Sep 7, 2023Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- ☆22Apr 12, 2023Updated 2 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Feb 19, 2026Updated last month
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆30Nov 9, 2021Updated 4 years ago
- A Tool that Finds, Enumerates, and Exploits Reolink Cameras.☆126Aug 28, 2021Updated 4 years ago
- A simple PHP web backdoor allows you to retrieve directory/file contents and upload file(s) from the local machine or remote URL.☆20Sep 18, 2021Updated 4 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Nov 19, 2021Updated 4 years ago
- DirBruter is a Python based CLI tool. It looks for hidden or existing directories/files using brute force method. It basically works by l…☆17Nov 15, 2023Updated 2 years ago
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆83Sep 15, 2022Updated 3 years ago
- A simple Bash Script to Bypass Spotify Ads.☆10Jul 7, 2021Updated 4 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆72Oct 2, 2023Updated 2 years ago
- a shell script aim to automatically launch 50+ online web scanning tools in the Browsaer against a target domain in a 10 waves☆66Sep 19, 2019Updated 6 years ago
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 11 months ago
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- Bash script for CTF automating basic enumeration☆41Mar 1, 2022Updated 4 years ago
- An AV exclusion enumeration tool written in Python.☆60Feb 17, 2022Updated 4 years ago
- simple code directory brute☆17Feb 26, 2021Updated 5 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Aug 9, 2021Updated 4 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Dec 6, 2023Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago