morph3 / crawpy
Yet another content discovery tool
☆119Updated 3 months ago
Alternatives and similar repositories for crawpy:
Users that are interested in crawpy are comparing it to the libraries listed below
- A burp suite extension that enumerates infrastructure and application admin interfaces (OTG-CONFIG-005)☆118Updated 2 years ago
- A WLAN red team framework.☆149Updated 4 months ago
- A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public☆63Updated 3 years ago
- Host Header Injection Scanner☆44Updated 4 years ago
- Wicked sick v2.0 script is intended to automate your reconnaissance process in an organized fashion.☆146Updated last year
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆120Updated 2 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 7 months ago
- pFuzz helps us to bypass web application firewall by using different methods at the same time.☆157Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆62Updated 4 years ago
- Striping CDN IPs from a list of IP Addresses☆75Updated 2 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆79Updated 3 years ago
- A very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.☆111Updated 4 months ago
- ☆167Updated 2 years ago
- A tool for generating reverse shell payloads on the fly.☆140Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆153Updated last week
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆126Updated 2 years ago
- Apache Spark Shell Command Injection Vulnerability☆88Updated 2 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆105Updated 2 months ago
- Multithreaded Plugin based vulnerability scanner for mass detection of web-based applications vulnerabilities☆117Updated last year
- Wordlists handcrafted (and automated) with ♥☆215Updated 10 months ago
- A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information f…☆109Updated this week
- Text4Shell scanner for Burp Suite☆189Updated 2 years ago
- Enumerate Subdomains Through Google Dorks☆123Updated 3 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆147Updated 3 years ago
- A Burp Suite plugin/extension that offers a shell in Burp. Both useful for OS Command injection and LFI exploration☆78Updated 4 years ago
- My useful files for penetration tests, security assessments, bug bounty and other security related stuff☆157Updated this week
- Build your own reconnaissance system with Osmedeus Next Generation☆184Updated 3 weeks ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆71Updated 10 months ago
- Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...☆95Updated 2 years ago
- SCodeScanner stands for Source Code scanner where the user can scans the source code for finding the Critical Vulnerabilities.☆161Updated last year