nmalcolm / Inventus
Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.
☆81Updated 7 years ago
Alternatives and similar repositories for Inventus
Users that are interested in Inventus are comparing it to the libraries listed below
Sorting:
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Updated 6 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆83Updated 2 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- A Python3 based single-file subdomain enumerator☆89Updated 5 years ago
- Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla, Drupal or Prestashop☆110Updated 6 years ago
- Listing subdomains about a main domain☆59Updated 7 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 12 years ago
- Scan for open S3 buckets and dump☆37Updated 7 years ago
- Image size issues plugin for Burp Suite☆94Updated 6 years ago
- Extension providing view with filtering capabilities for both complete and incomplete requests from all burp tools.☆48Updated 4 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆42Updated 7 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- OWASP Skanda - SSRF Exploitation Framework☆38Updated 11 years ago
- WhiteBox CMS analysis☆69Updated last year
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- ☆7Updated 7 years ago
- Extension adds a new tab in Burp Suite called Extractor☆42Updated 6 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆103Updated 7 years ago
- Simple script to automate brutforcing blind sql injection vulnerabilities☆50Updated 7 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆46Updated 3 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Burp scanner plugin based on Vulners.com vulnerability database☆25Updated 7 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆103Updated 6 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- Advance URL Fuzzing + Whois Domain running on python☆17Updated 2 years ago
- Convert your masscan/subdomain-scan results (80,443,8080) into screenshots for better analysis☆36Updated 6 years ago
- Burp Suite extension for JAX-RS☆65Updated 8 years ago
- ☆34Updated 5 years ago