scmanjarrez / CVEScannerV2
Nmap script that scans for probable vulnerabilities based on services discovered in open ports.
☆180Updated last month
Alternatives and similar repositories for CVEScannerV2:
Users that are interested in CVEScannerV2 are comparing it to the libraries listed below
- This tool will check for Sensitive Data Leakage with some useful patterns/RegEx. The patterns are mostly targeted on waybackdata and filt…☆198Updated 6 months ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆330Updated last year
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆185Updated 2 months ago
- This script Crawl the website and find the urls that contains html forms.☆71Updated 8 months ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆146Updated this week
- Shodan Dorks 2023☆232Updated last month
- Nuclei templates for honeypots detection.☆196Updated last year
- ☆94Updated last year
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆145Updated 9 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆147Updated 2 months ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆149Updated last year
- Docker Remote API Scanner and Exploit☆160Updated last year
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆103Updated last year
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆224Updated 5 months ago
- Shodan Dorks☆308Updated last week
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆436Updated this week
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 5 months ago
- Nodesub is a command-line tool for finding subdomains in bug bounty programs☆147Updated 6 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆237Updated 5 months ago
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆437Updated last month
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆80Updated 2 months ago
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆236Updated last month
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆196Updated 6 months ago
- A monster cheatsheet on MITM attacks☆324Updated last year
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆294Updated last year
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆346Updated last year
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆293Updated 10 months ago
- Tool for hiding Kali Linux on the network☆306Updated 9 months ago
- ☆197Updated 9 months ago