newstartlikenoneanthor-pixel / report-extractorView external linksLinks
CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.
☆37Sep 14, 2025Updated 5 months ago
Alternatives and similar repositories for report-extractor
Users that are interested in report-extractor are comparing it to the libraries listed below
Sorting:
- This repository contains all the GF-Patterns Repositories. All we have to do is just to run the given Shell File and it's Done !!☆21Jun 28, 2025Updated 7 months ago
- A simple browser extension to quickly find interesting security-related information on a webpage.☆169Jan 20, 2026Updated 3 weeks ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 2 months ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- An advanced networking tool for penetration testing... A place where floats and integers always win.☆22Aug 18, 2025Updated 5 months ago
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆20Jan 26, 2026Updated 2 weeks ago
- CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection☆17Jan 12, 2025Updated last year
- BookMark and Find Subdomains, Endpoints, External Domains in your web browser.☆28Aug 1, 2025Updated 6 months ago
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- ✨ Open-source AI hackers for your apps 👨🏻💻☆34Sep 9, 2025Updated 5 months ago
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆38Feb 3, 2025Updated last year
- WAFHUNTER is a Python script designed to detect Web Application Firewalls (WAFs) on websites. It uses a comprehensive list of WAF signatu…☆39Jan 29, 2026Updated 2 weeks ago
- Barcha is your Swiss‑Army knife for SQL Injection reconnaissance 🔍. Written in Go, it automates: Shodan enumeration of SSL hosts 🕵️♂️…☆30Apr 18, 2025Updated 9 months ago
- A resource full of Crypto/OSINT tools, techniques and training courses for CTI, AML, and forensic investigations.☆117Dec 23, 2025Updated last month
- ☆59Dec 10, 2025Updated 2 months ago
- ☆156Oct 28, 2025Updated 3 months ago
- Comunidade Brasileira de Cibersegurança☆22Oct 6, 2025Updated 4 months ago
- ☆33Apr 22, 2025Updated 9 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- Drana-Infinity is a locally hosted advanced AI assistant designed and developed by IHA089. It’s built specifically for cybersecurity, eth…☆167Dec 9, 2025Updated 2 months ago
- This toolkit useful in profiling, research and digital investigations built for me and my trainees. Working and necessary tools only. All…☆41Nov 22, 2025Updated 2 months ago
- A robust Python-based OSINT tool designed for validating and investigating email addresses across social media platforms and known data b…☆62Aug 6, 2025Updated 6 months ago
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆34Sep 26, 2025Updated 4 months ago
- Enrich your investigations on IPs, Domains etc. with OSINT☆56Apr 4, 2024Updated last year
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆85Nov 5, 2023Updated 2 years ago
- Web Recon Tool 🔍 An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information …☆25Nov 17, 2024Updated last year
- Data, analytic code, and findings supporting BuzzFeed News's analysis of diversity in the dialogue of Best Picture–nominated films☆10Jun 21, 2022Updated 3 years ago
- 一款支持检测web应用程序未授权访问缺陷的burp suite插件,可自定义配置检测字段以及返回包json数据分析☆12Apr 22, 2024Updated last year
- ☆25Jan 19, 2026Updated 3 weeks ago
- ☆109Feb 20, 2025Updated 11 months ago
- ☆75Nov 13, 2025Updated 3 months ago
- ☆23Mar 22, 2025Updated 10 months ago
- Esta es una extensión del proyecto original de Avilla Forensics☆12Nov 18, 2025Updated 2 months ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 9 months ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- WiFisploit is a tool designed to scan and attack Wi-Fi networks using variety of powerful and effective attacks. It contains numerous com…☆40Jun 16, 2025Updated 7 months ago
- Uzbek cyrillic/latin alphabetic, upper/lower/capital-case, name/surname/patronymic wordlists (dictionaries) and their combinations☆11Aug 4, 2022Updated 3 years ago