[EN] BETA: Layla - recon tool for bug bounty
☆75Feb 9, 2022Updated 4 years ago
Alternatives and similar repositories for Layla
Users that are interested in Layla are comparing it to the libraries listed below
Sorting:
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆19May 19, 2023Updated 2 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection☆32Jul 31, 2023Updated 2 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆112Dec 16, 2024Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Automate Auxiliary Module in Metasploit☆17Apr 18, 2021Updated 4 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 3 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆58Sep 7, 2023Updated 2 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Nov 19, 2021Updated 4 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 3 years ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- A simple PHP web backdoor allows you to retrieve directory/file contents and upload file(s) from the local machine or remote URL.☆20Sep 18, 2021Updated 4 years ago
- A Tool that Finds, Enumerates, and Exploits Reolink Cameras.☆126Aug 28, 2021Updated 4 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆71Oct 2, 2023Updated 2 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆48Jul 18, 2024Updated last year
- Static and dynamic Android application security analysis☆76Jun 2, 2024Updated last year
- ☆28Sep 10, 2022Updated 3 years ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆30Nov 9, 2021Updated 4 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- ☆21May 1, 2021Updated 4 years ago
- DirBruter is a Python based CLI tool. It looks for hidden or existing directories/files using brute force method. It basically works by l…☆17Nov 15, 2023Updated 2 years ago
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆83Sep 15, 2022Updated 3 years ago
- simple code directory brute☆17Feb 26, 2021Updated 5 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆144Feb 19, 2026Updated last week
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 3 years ago
- ☆15Aug 21, 2021Updated 4 years ago
- PathBuster - multiple hosts Web path scanner☆23Jun 3, 2024Updated last year
- Script en Bash que automatiza todos los pasos para retransmitir la solicitud de autenticación SMB con el objetivo de obtener una Shell.☆23Jul 16, 2025Updated 7 months ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆64Feb 6, 2022Updated 4 years ago
- This is a simple network scanner used to scan any range of IP Address to get their MAC Address. The code is written completely in Python …☆24Aug 29, 2021Updated 4 years ago