noptrix / httpgrep
Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.
☆35Updated last month
Alternatives and similar repositories for httpgrep:
Users that are interested in httpgrep are comparing it to the libraries listed below
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Python support package to parse IP and host inputs from network based tooling☆11Updated last year
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Magento Security Scanner☆15Updated 3 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- CVE-2020-5902☆9Updated 4 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆21Updated 3 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- module for certexfil☆15Updated 2 years ago
- Recon-ng modules for basic OSINT.☆11Updated 2 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Web crawler and downloader based on GNU Wget.☆12Updated last year
- ☆17Updated 4 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- Modular C2 server to tame your pack of wolves☆12Updated last year
- An exotic service bruteforce tool.☆12Updated 2 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago