pwnesia / ssbLinks
Secure Shell Bruteforcer — A faster & simpler way to bruteforce SSH server
☆1,314Updated 4 years ago
Alternatives and similar repositories for ssb
Users that are interested in ssb are comparing it to the libraries listed below
Sorting:
- a recon tool that allows searching on URLs that are exposed via shortener services☆1,661Updated 11 months ago
- Tool for especially scanning nearby devices and execute a given command on its own system while the target device comes in range.☆379Updated 4 years ago
- 🔪 Leak git repositories from misconfigured websites☆1,589Updated last month
- DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover☆854Updated 2 years ago
- Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration☆1,170Updated 3 weeks ago
- a drop-in replacement for Nmap powered by shodan.io☆3,149Updated 8 months ago
- The fastest dork scanner written in Go.☆1,268Updated last year
- A tool for IDN homograph attacks and detection.☆741Updated 4 years ago
- BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial …☆1,465Updated 4 years ago
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions☆2,250Updated 2 months ago
- C2/post-exploitation framework☆1,133Updated 4 years ago
- Dangerously fast DNS/network/port scanner☆921Updated 3 years ago
- PwnXSS: Vulnerability (XSS) scanner exploit☆805Updated 3 years ago
- A framework for constructing self-spreading binaries☆1,021Updated 2 years ago
- A fast tool to scan CRLF vulnerability written in Go☆1,503Updated this week
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,566Updated last month
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,393Updated 9 months ago
- A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus bu…☆570Updated 3 years ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,813Updated last year
- Search Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term (dork) with a default set of websites, bug bounty programs or custom …☆1,004Updated last week
- fully automated pentesting tool☆517Updated 3 years ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,768Updated last month
- Python Tool that gives you the ability to run Advanced Google Queries (Known as Google Dorks - Google Dorking)☆1,231Updated 6 months ago
- A versatile and portable proxy for capturing, manipulating, and replaying HTTP/HTTPS traffic on the go.☆2,961Updated this week
- Data leak checker & OSINT Tool☆574Updated 4 years ago
- Mass scan IPs for vulnerable services☆1,044Updated 3 years ago
- Fetch information about a public Google document.☆983Updated 2 years ago
- Golden Guide☆511Updated 5 months ago
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆1,080Updated this week
- A GNU/Linux monitoring and profiling tool focused on single processes.☆675Updated 4 years ago