s0md3v / Striker
Striker is an offensive information and vulnerability scanner.
☆2,275Updated last year
Alternatives and similar repositories for Striker:
Users that are interested in Striker are comparing it to the libraries listed below
- Reconnaissance Swiss Army Knife☆1,901Updated 4 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,242Updated this week
- File upload vulnerability scanner and exploitation tool.☆3,196Updated 2 years ago
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns☆1,508Updated last year
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,614Updated 5 months ago
- Find exploits in local and online databases instantly☆1,731Updated 3 years ago
- Advanced dork Search & Mass Exploit Scanner☆1,464Updated 8 months ago
- The Offensive Manual Web Application Penetration Testing Framework.☆1,813Updated 2 years ago
- Subdomain enumeration and information gathering tool☆1,288Updated 3 weeks ago
- Automated NoSQL database enumeration and web application exploitation tool.☆3,053Updated 9 months ago
- Advanced reconnaissance utility☆973Updated last year
- All In One Web Recon☆2,432Updated last week
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,179Updated 11 months ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,255Updated 9 months ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,709Updated 6 months ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,811Updated 3 years ago
- Mass scan IPs for vulnerable services☆1,031Updated 3 years ago
- Find web directories without bruteforce☆1,830Updated last year
- Intelligent login bruteforcer.☆877Updated 2 years ago
- A default credential scanner.☆1,479Updated 3 years ago
- Crack hashes in seconds.☆1,815Updated 4 months ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,158Updated 2 years ago
- massive SQL injection vulnerability scanner☆1,195Updated 6 years ago
- Know the dangers of credential reuse attacks.☆2,051Updated 6 months ago
- Phishing Campaign Toolkit☆2,385Updated 9 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,248Updated last week
- A Tool for Domain Flyovers☆5,755Updated 2 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆1,961Updated 3 years ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,336Updated last year
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,634Updated 2 weeks ago