Python framework to automatically discover and enumerate hosts from different back-end systems (Shodan, Censys)
☆299Jul 21, 2021Updated 4 years ago
Alternatives and similar repositories for grinder
Users that are interested in grinder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆143Jan 25, 2022Updated 4 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- Open source all-in-one CLI tool to semi-automate pentesting.☆180May 21, 2020Updated 5 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Automatically enumerate and fingerprint SD-WAN nodes on the internet☆49Jul 21, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆534Mar 27, 2022Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 10 months ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 9 years ago
- ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.☆726May 6, 2022Updated 3 years ago
- An easy-to-use and lightweight API wrapper for Censys APIs.☆461Apr 22, 2026Updated last week
- Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It suppo…☆374Mar 6, 2024Updated 2 years ago
- Mass scan IPs for vulnerable services☆1,048Apr 26, 2026Updated last week
- LinkedIn reconnaissance tool☆54Dec 17, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- The Swiss Army knife for automated Web Application Testing☆2,335May 8, 2024Updated last year
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- Automate Metasploit scanning and exploitation☆117Jul 20, 2025Updated 9 months ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆247Nov 17, 2019Updated 6 years ago
- Hacking, pen-testing, and cyber-security related tools built with Python.☆36Nov 20, 2020Updated 5 years ago
- A small collection of scripts that are useful for implementing Domain Fronting in an assessment.☆13Apr 25, 2019Updated 7 years ago
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆214Jun 23, 2020Updated 5 years ago
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆756Jul 17, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Automates searching Shodan for vulnerable systems in your neighborhood.☆12Jul 16, 2020Updated 5 years ago
- 🚀 A DNS automated scanner and tool 🖱️ (Zone Transfer, DNS Zone Takeover, Subdomain Takeover).☆300Oct 5, 2024Updated last year
- Fast directory scanning and scraping tool☆632Apr 14, 2026Updated 3 weeks ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆347Jul 20, 2020Updated 5 years ago
- CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search eng…☆376Feb 4, 2024Updated 2 years ago
- Scripts for hacking through wireless network [WiFi]☆27Oct 16, 2022Updated 3 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆273Mar 24, 2021Updated 5 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆824Nov 15, 2025Updated 5 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Converting data from services like Censys and Shodan to a common data model☆52Apr 14, 2026Updated 3 weeks ago
- Overlord - Red Teaming Infrastructure Automation☆632May 28, 2024Updated last year
- Attack Surface Management since before Attack Surface Management was a thing☆658Apr 27, 2026Updated last week
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 7 years ago
- ☆128Jun 19, 2020Updated 5 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆58Aug 11, 2023Updated 2 years ago