☆20Jul 7, 2024Updated last year
Alternatives and similar repositories for WebRecon2
Users that are interested in WebRecon2 are comparing it to the libraries listed below
Sorting:
- Recon script for wildcard domain web scopes... (for use on synack red team)☆27Mar 31, 2023Updated 2 years ago
- Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online persona…☆18Oct 16, 2024Updated last year
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- Subtron is a professional grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆24Feb 14, 2026Updated last month
- Minified version of Project Sherlock written in GO. Lookup given username from 1000 social networks☆31Oct 19, 2023Updated 2 years ago
- A Burp Extension that makes it easier to view all script code on a Response.☆17Nov 12, 2023Updated 2 years ago
- An another JWT cracker but really fast!☆12Jan 26, 2023Updated 3 years ago
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes☆15Aug 4, 2022Updated 3 years ago
- Tool to find stored robots.txt files from the past☆19Jun 4, 2023Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆42Jan 30, 2026Updated last month
- hacking tools☆14Jan 29, 2023Updated 3 years ago
- ☆18Apr 7, 2022Updated 3 years ago
- Automate Scoping, OSINT and Recon assessments.☆112Feb 3, 2026Updated last month
- CRLF Bug scanner for WebPentesters and Bugbounty Hunters☆44Jun 9, 2023Updated 2 years ago
- ☆28Jan 6, 2024Updated 2 years ago
- Automation to report malicious actors to AbuseIPDB for users of Cloudflare WAF☆21May 24, 2025Updated 9 months ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated 2 months ago
- ☆25Jul 7, 2023Updated 2 years ago
- In this repo, I have created a subdomain enumeration function that grab subdomains in deep.☆23Mar 19, 2023Updated 3 years ago
- Returns disallowed paths from robots.txt found on your target domain and snapshotted by the Wayback Machine☆28Jul 18, 2025Updated 8 months ago
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆374Jul 25, 2023Updated 2 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 8 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Aug 11, 2024Updated last year
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- jsleak is a tool to find secret , paths or links in the source code during the recon.☆581Sep 25, 2025Updated 5 months ago
- A tool to hide virtual machines (VMs) from malicious actors.☆35Oct 26, 2024Updated last year
- HTTP Requests for security researchers☆64Jul 3, 2023Updated 2 years ago
- m0bilesecurity's Github Profile Header☆11Dec 5, 2020Updated 5 years ago
- ShootCutMe an .LNK file creator tool for redteamer☆16Oct 2, 2024Updated last year
- Cross Site Scripting ( XSS ) Vulnerability Payload List☆23Feb 23, 2021Updated 5 years ago
- Test the speed and reliability of a list of DNS servers☆22Dec 9, 2020Updated 5 years ago
- It grep subdomains, email/username, build custom wordlist etc from gau results☆50Nov 4, 2022Updated 3 years ago
- Enhanced 403 bypass header☆21Sep 12, 2022Updated 3 years ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Jul 21, 2023Updated 2 years ago
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Mar 13, 2023Updated 3 years ago