Python framework to automatically discover and enumerate hosts from different back-end systems (Shodan, Censys)
☆297Jul 21, 2021Updated 4 years ago
Alternatives and similar repositories for grinder
Users that are interested in grinder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- Open source all-in-one CLI tool to semi-automate pentesting.☆176May 21, 2020Updated 5 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 9 months ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 8 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.☆727May 6, 2022Updated 3 years ago
- Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It suppo…☆374Mar 6, 2024Updated 2 years ago
- Mass scan IPs for vulnerable services☆1,047Feb 17, 2022Updated 4 years ago
- LinkedIn reconnaissance tool☆54Dec 17, 2021Updated 4 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The Swiss Army knife for automated Web Application Testing☆2,321May 8, 2024Updated last year
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 8 months ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆247Nov 17, 2019Updated 6 years ago
- Hacking, pen-testing, and cyber-security related tools built with Python.☆36Nov 20, 2020Updated 5 years ago
- A small collection of scripts that are useful for implementing Domain Fronting in an assessment.☆14Apr 25, 2019Updated 6 years ago
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆213Jun 23, 2020Updated 5 years ago
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆758Jul 17, 2023Updated 2 years ago
- Automates searching Shodan for vulnerable systems in your neighborhood.☆12Jul 16, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 🚀 A DNS automated scanner and tool 🖱️ (Zone Transfer, DNS Zone Takeover, Subdomain Takeover).☆299Oct 5, 2024Updated last year
- Fast directory scanning and scraping tool☆632Feb 5, 2026Updated last month
- Find cloud assets that no one wants exposed 🔎 ☁️☆347Jul 20, 2020Updated 5 years ago
- CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search eng…☆376Feb 4, 2024Updated 2 years ago
- Scripts for hacking through wireless network [WiFi]☆26Oct 16, 2022Updated 3 years ago
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆271Mar 24, 2021Updated 5 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- Awesome Pentest Reports☆19Jun 16, 2023Updated 2 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆825Nov 15, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Converting data from services like Censys and Shodan to a common data model☆52Feb 22, 2026Updated last month
- Overlord - Red Teaming Infrastructure Automation☆630May 28, 2024Updated last year
- Attack Surface Management since before Attack Surface Management was a thing☆659Mar 16, 2026Updated last week
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 7 years ago
- ☆127Jun 19, 2020Updated 5 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆783Jun 20, 2020Updated 5 years ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆832May 22, 2023Updated 2 years ago