Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.
☆64Feb 6, 2022Updated 4 years ago
Alternatives and similar repositories for ComPP
Users that are interested in ComPP are comparing it to the libraries listed below
Sorting:
- Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions.☆217Aug 26, 2024Updated last year
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆28Feb 1, 2026Updated 3 weeks ago
- Obtain a clean-cut architecture at the launch of a mission and run some tests ( subdomain search, fuzzing, make screenshots on a given pe…☆25Jul 18, 2023Updated 2 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆48Jul 18, 2024Updated last year
- Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many features☆198Mar 27, 2025Updated 11 months ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Aug 9, 2021Updated 4 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- A penetration testing and vulnerability management application written using the powerful django framework.☆30Nov 22, 2023Updated 2 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆27Apr 17, 2022Updated 3 years ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year
- ADDS (Active Directory Domain Services)☆28Feb 3, 2026Updated 3 weeks ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Oct 15, 2020Updated 5 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 3 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- Multi-threaded Padding Oracle attacks against any service. Written in Rust.☆98Mar 5, 2023Updated 2 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- simple code directory brute☆17Feb 26, 2021Updated 5 years ago
- The largest collection of wordlists in yaml for bug bounty tools☆37Apr 7, 2024Updated last year
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- PathBuster - multiple hosts Web path scanner☆23Jun 3, 2024Updated last year
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- The objective of this Burp Suite extension is the flexible and dynamic extraction, correlation, and structured presentation of informatio…☆59Dec 31, 2022Updated 3 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- Generate customized Password/Passphrase wordlist based on target information☆97Feb 20, 2026Updated last week
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.☆90Updated this week
- ☆11Dec 5, 2020Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- The ldapconsole script allows you to perform custom LDAP requests to a Windows domain.☆65Jan 20, 2026Updated last month