morph3 / crawpy
Yet another content discovery tool
☆119Updated 4 months ago
Alternatives and similar repositories for crawpy:
Users that are interested in crawpy are comparing it to the libraries listed below
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 8 months ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆120Updated 2 years ago
- Wicked sick v2.0 script is intended to automate your reconnaissance process in an organized fashion.☆146Updated 2 years ago
- Striping CDN IPs from a list of IP Addresses☆75Updated 2 years ago
- A burp suite extension that enumerates infrastructure and application admin interfaces (OTG-CONFIG-005)☆118Updated 2 years ago
- A WLAN red team framework.☆151Updated 5 months ago
- A Burp Suite plugin/extension that offers a shell in Burp. Both useful for OS Command injection and LFI exploration☆79Updated 4 years ago
- It's a simple tool for test vulnerability shellshock☆116Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆62Updated 4 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆105Updated 3 months ago
- pFuzz helps us to bypass web application firewall by using different methods at the same time.☆158Updated 4 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public☆63Updated 3 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆61Updated 3 years ago
- Simple fork from degoogle original project with bug hunting purposes☆87Updated 2 years ago
- Text4Shell scanner for Burp Suite☆189Updated 2 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆79Updated 3 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆147Updated 3 years ago
- Windows for Red Teamers☆125Updated 2 years ago
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆127Updated 3 years ago
- Enumerate Subdomains Through Google Dorks (Bypassed Page Filter)☆123Updated this week
- ☆53Updated 2 years ago
- A tool for generating reverse shell payloads on the fly.☆140Updated 2 years ago
- A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information f…☆111Updated last week
- [EN] BETA: Layla - recon tool for bug bounty☆76Updated 3 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 2 months ago
- Huge Collection of Wordpress Exploits and CVES☆123Updated 2 years ago
- A very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.☆112Updated 5 months ago
- Given a list of domains, you resolve them and get the IP addresses.☆48Updated 3 years ago
- ☆68Updated last year