Essential tool for finding blind injection attacks.
☆49Feb 6, 2019Updated 7 years ago
Alternatives and similar repositories for duct
Users that are interested in duct are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 5 months ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆13Oct 1, 2018Updated 7 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- ☆25May 9, 2021Updated 4 years ago
- Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.☆261Apr 7, 2023Updated 2 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 3 years ago
- HashCobra Hash Cracking tool.☆122Dec 1, 2020Updated 5 years ago
- A tool written in python for scraping firebase data☆43Apr 5, 2020Updated 5 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Jan 7, 2020Updated 6 years ago
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆83Updated this week
- ☆38Jul 3, 2020Updated 5 years ago
- Automated SonarQube☆70Jun 3, 2019Updated 6 years ago
- ☆14Aug 27, 2025Updated 6 months ago
- Toolkit to detect and keep track on Blind XSS, XXE & SSRF☆293Aug 23, 2019Updated 6 years ago
- Hunt Open MongoDB instances☆79Sep 25, 2019Updated 6 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Jun 3, 2018Updated 7 years ago
- ☆92Dec 8, 2022Updated 3 years ago
- A command line security audit tool for Amazon Web Services☆82Mar 4, 2019Updated 7 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- Rock-On is a all in one Recon tool that will just get a single entry of the Domain name and do all of the work alone.☆294Nov 30, 2019Updated 6 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆91May 10, 2020Updated 5 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Apr 29, 2019Updated 6 years ago
- Blind SQL Injection Tool with Golang☆80Dec 31, 2021Updated 4 years ago
- Reclaim control of your Burp Suite Repeater tabs with this powerful extension☆68Aug 15, 2021Updated 4 years ago
- A better version of my xssfinder tool - scans for different types of xss on a list of urls.☆187Aug 3, 2019Updated 6 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Mar 11, 2019Updated 7 years ago
- Network Pivoting Toolkit☆457Aug 26, 2023Updated 2 years ago
- Automatic UAC-Bypassing for custom payloads during privilege escalation testing☆98Aug 13, 2022Updated 3 years ago
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆109Oct 10, 2020Updated 5 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Aug 11, 2021Updated 4 years ago