roys / cewlerLinks
CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.
☆131Updated last month
Alternatives and similar repositories for cewler
Users that are interested in cewler are comparing it to the libraries listed below
Sorting:
- Custom scan profiles for use with Burp Suite Pro☆147Updated last year
- ☆78Updated 4 months ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆100Updated 3 months ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆67Updated last year
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆204Updated 11 months ago
- ☆172Updated 3 months ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆110Updated 2 years ago
- ☆124Updated 2 months ago
- Recon MindMap (RMM)☆163Updated last year
- Vulnerabilities you my miss during a penetration testing.☆98Updated last year
- Nodesub is a command-line tool for finding subdomains in bug bounty programs☆148Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆153Updated last month
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆154Updated 8 months ago
- Helios: Automated XSS Testing☆155Updated last year
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆109Updated last year
- Local File Inclusion discovery and exploitation tool☆330Updated 10 months ago
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆47Updated last year
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆265Updated last year
- Simple HTTP listener for security testing☆117Updated 11 months ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆225Updated 11 months ago
- A fully automated subdomain reconnaissance and sensitive data discovery toolkit.☆45Updated 4 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆130Updated 9 months ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆76Updated last year
- Session Hijacking Visual Exploitation☆209Updated last year
- ☆93Updated 7 months ago
- The repository contains useful GitHub dorks for finding open-source vulnerabilities.☆88Updated last year
- Search for all leaked keys/secrets using one regex! bugbounty☆142Updated 7 months ago
- My notes containing the Certified Red Team Professional Course☆63Updated last year
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆211Updated 2 months ago
- A wordlist repository with human-curated and reviewed content.☆119Updated 2 years ago