noptrix / httpgrep
Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.
☆35Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for httpgrep
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Python support package to parse IP and host inputs from network based tooling☆10Updated last year
- Recon-ng modules for basic OSINT.☆10Updated 2 years ago
- Standardizing Security Titles☆13Updated last year
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆21Updated 10 months ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- Command List for Hashcat and default keyspaces.☆14Updated 4 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- The best way to send emails in Go.☆10Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated last year
- Extract endpoints from specific Git repository for fuzzing☆21Updated 4 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆18Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last month
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago
- Web based favicon recon tool made using streamlit.☆9Updated 2 years ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 7 months ago
- CRACK AND CHECK HASH TYPES IN BULK☆12Updated 3 years ago