saeeddhqan / PWGLinks
Penetration Testing with Golang
☆44Updated 2 years ago
Alternatives and similar repositories for PWG
Users that are interested in PWG are comparing it to the libraries listed below
Sorting:
- Complex payload encoder☆235Updated last year
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆132Updated 3 years ago
- ☆66Updated 2 years ago
- Fetch data (open ports, CVEs, CPEs, ...) from shodan internetDB API☆92Updated 2 years ago
- Talosplus is a fast and robust template based Intelligent automation framework primarily developed for Bug Bounty Automation☆89Updated 2 years ago
- A wrapper around tools used for subdomain enumeration, to automate the workflow, on a given domain, written in bash.☆80Updated 3 years ago
- Striping CDN & WAF IPs from a list of IP Addresses☆79Updated 6 months ago
- A quick ‘n dirty nmap parser written in Golang to convert nmap xml to IP:Port notation.☆129Updated last year
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.com☆107Updated 3 years ago
- ☆51Updated 8 years ago
- ☆77Updated 4 years ago
- 🔭 Collection of regexp pattern for security passive scanning☆117Updated 2 years ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆76Updated last year
- ☆57Updated 3 years ago
- ☆159Updated 3 years ago
- List all public repositories for (valid) GitHub usernames☆76Updated 2 years ago
- Vulnerable NodeJS Web Application☆97Updated last year
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- Advanced Reconnaissance and Web Application Discovery☆88Updated 3 years ago
- Notes from OSCP, CTF, security adventures, etc...☆62Updated last year
- Attack Surface Discovery Tool☆110Updated last year
- Go scripts for finding sensitive data like API key / some keywords in the github repository☆159Updated 3 years ago
- ☆74Updated last year
- HTTP verb tampering & methods enumeration☆63Updated 4 months ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆125Updated 3 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆24Updated last week
- Determine the running software version of a remote F5 BIG-IP management interface.☆69Updated last year
- ☆49Updated 5 years ago
- Small tool to automate SSRF wordpress and XMLRPC finder☆81Updated 2 years ago
- A tool to discover and exploit Nginx alias traversal misconfiguration, the tool can bruteforce the URL path recursively to find out hidde…☆128Updated last year