sec-it / ComPPLinks
Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.
☆64Updated 3 years ago
Alternatives and similar repositories for ComPP
Users that are interested in ComPP are comparing it to the libraries listed below
Sorting:
- Google Meet Phishing Template For Gophish☆48Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆71Updated 3 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated last year
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- ☆37Updated 2 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆69Updated 4 years ago
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.com☆107Updated 3 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆69Updated 2 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆45Updated 5 years ago
- Lookup for interesting stuff in SMB shares☆151Updated 2 years ago
- Collaborative pentest tool with highly customizable tools☆73Updated 4 years ago
- Super organized and flexible script for sending phishing campaigns☆56Updated 4 years ago
- Creates and sends fake meeting invite☆75Updated 4 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆77Updated last year
- Fast website scraper and wordlist generator☆82Updated 8 months ago
- ☆58Updated 3 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- Repository of CVE found by OCD people☆83Updated 7 months ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆30Updated 3 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- ☆29Updated 4 years ago
- ☆73Updated 7 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago