An AI-powered Personal Identifiable Information (PII) scanner.
☆723Jan 22, 2025Updated last year
Alternatives and similar repositories for Octopii
Users that are interested in Octopii are comparing it to the libraries listed below
Sorting:
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆436Dec 30, 2025Updated 2 months ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆978Jan 12, 2024Updated 2 years ago
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆407Jan 22, 2025Updated last year
- ☆89Feb 11, 2022Updated 4 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.☆426Feb 20, 2026Updated 2 weeks ago
- OSINT tools and more but without API key☆1,484Feb 15, 2026Updated 2 weeks ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆175Nov 7, 2022Updated 3 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Jan 24, 2023Updated 3 years ago
- 🕵️ Python project to crawl for JavaScript files and search for secrets like API keys, authorization tokens, hardcoded credentials, etc.☆429May 15, 2025Updated 9 months ago
- Pentesting automation platform that combines hacking tools to complete assessments☆522Feb 26, 2026Updated last week
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆128Jun 2, 2022Updated 3 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,529Jan 15, 2026Updated last month
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆300Sep 8, 2023Updated 2 years ago
- ☆198Jan 18, 2023Updated 3 years ago
- Cloud Exploit Framework☆112May 11, 2022Updated 3 years ago
- A GraphQL enumeration and extraction tool☆133Jan 29, 2023Updated 3 years ago
- Arsenal is a Simple shell script (Bash) used to install tools and requirements for Bug Bounty☆285Jun 3, 2024Updated last year
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆888May 3, 2023Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,156Updated this week
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Jan 22, 2025Updated last year
- Automating situational awareness for cloud penetration tests.☆2,299Updated this week
- ProjectDiscovery's Open Source Tool Manager☆1,069Jan 5, 2026Updated 2 months ago
- Sandman is a NTP based backdoor for hardened networks.☆815Mar 31, 2024Updated last year
- Discover new target domains using Content Security Policy☆505Feb 7, 2026Updated 3 weeks ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,006Updated this week
- Nodesub is a command-line tool for finding subdomains in bug bounty programs☆148Aug 1, 2024Updated last year
- Unleash the power of cloud☆815Nov 19, 2024Updated last year
- ReconPal: Leveraging NLP for Infosec