mmpx12 / pwndb
another pwndb tool with more options
☆15Updated 4 years ago
Alternatives and similar repositories for pwndb
Users that are interested in pwndb are comparing it to the libraries listed below
Sorting:
- Just a better dirbuster☆12Updated 2 years ago
- Dehashed API CLI☆20Updated 4 years ago
- Interview questions to screen offensive (red team/pentest) candidates☆11Updated 8 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- WebHook for Red Team☆26Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Repository of tools used in my blog☆51Updated last year
- Automated Penetration Testing☆14Updated 4 years ago
- Mobile Pentesting Guide (WIP)☆24Updated 5 years ago
- A collection of hacks and one-off scripts☆10Updated 5 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated 3 months ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- AIL framework - Analysis Information Leak framework☆8Updated 7 years ago
- Chat GPT Things by Taylor Newsome☆12Updated last year
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 2 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- ShellC0de Generator☆11Updated 4 years ago
- Tactics, Techniques, and Procedures☆25Updated 3 months ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- Wordlist generated using leaked databases, Pipal, and CUPP.☆33Updated 7 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆12Updated 3 years ago
- Deepsearch leak database client, as an alternative for pwndb☆15Updated 2 years ago