Attack Surface Mapper is a reconnaissance tool that uses a mixture of open source intellgence and active techniques to expand the attack surface of your target. You feed in a mixture of one or more domains, subdomains and IP addresses and it uses numerous techniques to find more targets. It enumerates subdomains with bruteforcing and passive loo…
☆18Apr 8, 2024Updated 2 years ago
Alternatives and similar repositories for AttackSurfaceMapper
Users that are interested in AttackSurfaceMapper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- 📨 Quick tool to finds and extract email addresses from a body of text☆12Apr 15, 2023Updated 2 years ago
- View emails in Discord using Cloudflare Email Routing☆10Dec 15, 2023Updated 2 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- ☆12Jun 12, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- My attempt to turn Emacs into VSCode☆10May 19, 2025Updated 10 months ago
- against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible…☆21Feb 27, 2016Updated 10 years ago
- Herramienta en desarrollo la cual busca la sencillez a la hora de hacer PenTesting Ethicos. [NO ME HAGO RESPONSABLE DEL MAL USO DE ESTA H…☆11Aug 1, 2023Updated 2 years ago
- Ailyn is a simple but powerful open-source virtual sales agent that uses Retrieval Augmented Generation (RAG) techniques to provide custo…☆16Oct 24, 2023Updated 2 years ago
- Full Deobfuscator for PEUnion 4.0.0 (.NET & PE32)☆23Apr 21, 2022Updated 3 years ago
- Telegram Group Manager Bot Written In Python Using Pyrogram.☆12Aug 25, 2023Updated 2 years ago
- An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering …☆10Jan 23, 2019Updated 7 years ago
- ☆11Oct 10, 2017Updated 8 years ago
- First level taint implementation with qemu for linux user mode☆28Aug 11, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Implementation of the CodeAct agentic framework with Docker containers for security, MCP servers for tool integrations, and multi-agent s…☆40Oct 22, 2025Updated 5 months ago
- A customized mixed PT-BR wordlist for pentesting purposes.☆14Apr 14, 2019Updated 6 years ago
- Trace a program using CPU tracer technology.☆27Nov 9, 2022Updated 3 years ago
- DNP3 Cyber-attack datasets☆16Mar 9, 2017Updated 9 years ago
- CopyToAsm (x64) - A Plugin For x64dbg☆31Jul 17, 2018Updated 7 years ago
- Source code of a online medicine shop to buy medicines and locate nearby medicine stores. This is my final year college project .☆11Dec 8, 2022Updated 3 years ago
- 🔏 A web presentation for explaining secure coding best practices☆25Jun 16, 2023Updated 2 years ago
- this tool can deploy malware using wifi that it can be downloaded by the user.☆13Dec 16, 2023Updated 2 years ago
- Quixotic Color Scheme for Papirus Icons☆19Aug 16, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆13Feb 7, 2020Updated 6 years ago
- ☆29Nov 14, 2022Updated 3 years ago
- Write and execute PHP with only 6 different characters: ([.^])☆20Sep 5, 2021Updated 4 years ago
- De4dot MOD with few unpackers added☆14Oct 11, 2016Updated 9 years ago
- OSS-Fuzz Public Corpora Crawler☆30Feb 23, 2023Updated 3 years ago
- Use Ghidra Structs in Python☆30Mar 28, 2021Updated 5 years ago
- An astronomical collection of space-related cybersecurity tools 🚀✨☆25Jul 9, 2023Updated 2 years ago
- A python script to hide information over an audio file in .wav format☆19Oct 7, 2017Updated 8 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆126May 25, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The Fuzzil is a program which injects automatically data into a webpage and detect potential bugs.☆21Mar 5, 2020Updated 6 years ago
- Check arbitrary file download vulnerability in the WordPress☆23Feb 21, 2020Updated 6 years ago
- A set of simple tools leveraging Selenium for scraping LinkedIn through LinkedIn Sales Navigator or LinkedIn Recruiter.☆23Aug 22, 2023Updated 2 years ago
- ☆35Feb 10, 2023Updated 3 years ago
- Install any apk into dual app space☆27Jan 28, 2022Updated 4 years ago
- Hierarchical Universal Modular ANotator☆12Mar 29, 2026Updated last week
- Simple GUI app to simplify manual string decryption with de4dot☆27Jan 25, 2022Updated 4 years ago