roys / cewlerLinks
CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.
☆116Updated 3 weeks ago
Alternatives and similar repositories for cewler
Users that are interested in cewler are comparing it to the libraries listed below
Sorting:
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆153Updated 6 months ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆94Updated last month
- Custom scan profiles for use with Burp Suite Pro☆144Updated last year
- ☆74Updated 2 months ago
- Simple HTTP listener for security testing☆116Updated 9 months ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆224Updated 8 months ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆68Updated last year
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆121Updated last week
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆198Updated 9 months ago
- ☆79Updated last year
- Find CVEs associated to Linux and public exploits on github☆119Updated 4 months ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆97Updated last year
- ☆189Updated 4 months ago
- Everything and anything related to password spraying☆144Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆150Updated 2 weeks ago
- ☆92Updated 5 months ago
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆151Updated 10 months ago
- ☆172Updated 3 weeks ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆210Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆90Updated last year
- Local File Inclusion discovery and exploitation tool☆317Updated 8 months ago
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆264Updated last year
- Recon MindMap (RMM)☆161Updated last year
- ☆94Updated 4 months ago
- A wordlist repository with human-curated and reviewed content.☆115Updated last year
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆104Updated 10 months ago
- ☆170Updated 4 months ago
- Interact with Hackthebox using your terminal - Be faster and more competitive !☆131Updated 4 months ago
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆143Updated 4 months ago
- Vulnerabilities you my miss during a penetration testing.☆99Updated last year