networkdavit / python-scripts
β17Updated 4 months ago
Alternatives and similar repositories for python-scripts:
Users that are interested in python-scripts are comparing it to the libraries listed below
- π CSRFShark - a utility for manipulating cross-site request forgery attacksβ30Updated last year
- All in 1 phishing frameworkβ35Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.β24Updated 7 months ago
- 1C RAS Offensive Security Toolβ25Updated last year
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from β¦β12Updated 5 months ago
- β13Updated last year
- Enumeration & fingerprint toolβ24Updated last year
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser auβ¦β79Updated 3 months ago
- This repository contains the best fuzzing wordlist filesβ29Updated 3 months ago
- β19Updated last year
- Search-Scan-Save-Notifyβ12Updated 3 years ago
- Monitor your target continuously for new subdomains!β26Updated last year
- Apanel is a tool to find admin panel of a site.β8Updated 2 years ago
- Web Recon Tool π An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information β¦β22Updated 3 months ago
- Brute forcing login pages with SQL Injection queries with cURLβ17Updated 2 years ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.β27Updated last year
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.β18Updated 10 months ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticalβ¦β31Updated last year
- A bash script for performing advanced Google dork searches to find files, names, usernames, emails, phone numbers, and images.β25Updated 8 months ago
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains β¦β39Updated last year
- PowerSploit - A PowerShell Post-Exploitation Frameworkβ23Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 2 years ago
- Kali Packerge Managerβ58Updated last year
- aiohttp LFI (CVE-2024-23334)β25Updated 11 months ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a β¦β16Updated 6 months ago
- Burp suite extension to find sensitive information by checking incoming text OR binary websocket messagesβ34Updated last month
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the Fβ¦β26Updated last year