pry0cc / lazy
This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!
☆14Updated 4 years ago
Related projects: ⓘ
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆15Updated 4 years ago
- Standardizing Security Titles☆13Updated last year
- Simple utility to manage multiple ssh☆13Updated 2 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆12Updated 2 years ago
- ☆10Updated this week
- Extract endpoints from specific Git repository for fuzzing☆21Updated 3 years ago
- Web based favicon recon tool made using streamlit.☆10Updated 2 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Updated 3 years ago
- Command List for Hashcat and default keyspaces.☆14Updated 4 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆9Updated 3 years ago
- ☆20Updated this week
- Shell hunter for AF☆34Updated 2 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Free Email Providers☆10Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 5 months ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 3 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆15Updated 4 years ago
- ☆10Updated this week
- miscellaneous sploit scripts/hacks☆13Updated 2 months ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 3 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆10Updated 4 years ago
- Burp Suite extension for extracting metadata from files☆19Updated 3 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 3 months ago
- Remove Offensive and Profane Words from Wordlists☆13Updated last year
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆17Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year