This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!
☆13Jun 13, 2020Updated 5 years ago
Alternatives and similar repositories for lazy
Users that are interested in lazy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a tool that gets all paths at robots.txt and opens it in the browser.☆14Aug 2, 2019Updated 6 years ago
- A tiny set of helper scripts for ipinfo☆17Aug 7, 2020Updated 5 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- ☆12Aug 1, 2022Updated 3 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- Command List for Hashcat and default keyspaces.☆17Feb 13, 2020Updated 6 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- autocrack adds queue support for hashcat cracking.☆41Mar 16, 2023Updated 3 years ago
- A framework for secure and scalable network traffic analysis - https://netcap.io☆17May 8, 2019Updated 6 years ago
- Use Python to manipulate Charles session files and send HTTP requests.☆13Dec 8, 2022Updated 3 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Jul 6, 2012Updated 13 years ago
- Blogs, Tools and other available resources for source code review.☆10Nov 18, 2021Updated 4 years ago
- Transform your batch (bat) script into one binary.exe☆53Feb 11, 2024Updated 2 years ago
- A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!☆86Apr 3, 2020Updated 5 years ago
- Inspired by gowitness and EyeWitness☆15Mar 11, 2025Updated last year
- A badass grabbing tool for getting PDF's of books.☆26Aug 23, 2018Updated 7 years ago
- An alternative to Tdrop for a dropdown terminal - written in Rust☆13Oct 31, 2023Updated 2 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Feb 6, 2016Updated 10 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- Go CLI toolkit☆20Dec 18, 2023Updated 2 years ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated 2 months ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 3 months ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Aug 11, 2023Updated 2 years ago
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated 2 months ago
- Mobile Pentesting Guide (WIP)☆26May 13, 2020Updated 5 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- Pentesting resources☆23May 3, 2019Updated 6 years ago
- The scripts I write to help me on my bug bounty hunting☆124Jan 8, 2022Updated 4 years ago