Python framework to automatically discover and enumerate hosts from different back-end systems (Shodan, Censys)
☆297Jul 21, 2021Updated 4 years ago
Alternatives and similar repositories for grinder
Users that are interested in grinder are comparing it to the libraries listed below
Sorting:
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆536Mar 27, 2022Updated 3 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- Open source all-in-one CLI tool to semi-automate pentesting.☆165May 21, 2020Updated 5 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆213Jun 23, 2020Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 8 months ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.☆727May 6, 2022Updated 3 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆247Nov 17, 2019Updated 6 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It suppo…☆374Mar 6, 2024Updated last year
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆16Dec 14, 2020Updated 5 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- Overlord - Red Teaming Infrastructure Automation☆628May 28, 2024Updated last year
- A query aggregator for OSINT based threat hunting☆930Jan 23, 2026Updated last month
- 🚀 A DNS automated scanner and tool 🖱️ (Zone Transfer, DNS Zone Takeover, Subdomain Takeover).☆297Oct 5, 2024Updated last year
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆829May 22, 2023Updated 2 years ago
- Attack Surface Management since before Attack Surface Management was a thing☆657Feb 23, 2026Updated last week
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆272Mar 24, 2021Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆144Feb 19, 2026Updated last week
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆757Jul 17, 2023Updated 2 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Aug 11, 2023Updated 2 years ago
- Hacking, pen-testing, and cyber-security related tools built with Python.☆36Nov 20, 2020Updated 5 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 7 months ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆826Nov 15, 2025Updated 3 months ago
- Rock-On is a all in one Recon tool that will just get a single entry of the Domain name and do all of the work alone.☆294Nov 30, 2019Updated 6 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- Fast directory scanning and scraping tool☆630Feb 5, 2026Updated 3 weeks ago
- Mass scan IPs for vulnerable services☆1,046Feb 17, 2022Updated 4 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- network visualization & pentest reporting☆532May 2, 2023Updated 2 years ago
- Easy brute forcing to whatever you want - Jose Pino☆65Mar 23, 2015Updated 10 years ago
- A Virtual environment for Pentesting IoT Devices☆443Aug 25, 2025Updated 6 months ago