shellhunter / gocewl
gocewl is a commandline tool to generate custom wordlists by crawling webpages
☆46Updated 4 years ago
Alternatives and similar repositories for gocewl:
Users that are interested in gocewl are comparing it to the libraries listed below
- Offensive Security recon tool☆92Updated 3 years ago
- Dump exposed HTTP .git fast☆49Updated 2 years ago
- Cloud Discovery - brute force public AWS, GCP, Alibaba, and Azure cloud services☆23Updated 4 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Updated 2 years ago
- ⚡️ Multiple target ZAP Scanning☆104Updated last year
- VHostChecker takes a csv list of targets in the form of domain,ip,port and runs 4 seperate connection checks to get a quick sense of how …☆33Updated last year
- A bridge between masscan and nmap - run fast masscan, parse output, execute nmap using masscan as input☆28Updated 3 months ago
- DO NOT RUN THIS.☆47Updated 3 years ago
- A program to map out SPF and DKIM records for a large number of domains☆37Updated 10 years ago
- A simple tool to detect wildcards domain based on Amass's wildcards detector.☆62Updated 3 years ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆39Updated 4 years ago
- ☆28Updated 4 years ago
- The original slurp source☆33Updated 6 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- A fast multi threaded scanner for Citrix ADC (NetScaler) CVE-2019-19781 - Citrixmash / Shitrix☆35Updated 5 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- A web shell for pivoting and lateral movement☆34Updated 7 years ago
- Common Wordlists☆53Updated 8 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 3 years ago
- A Payload Injector for bugbounties written in go☆70Updated 4 years ago
- Related subdomains finder☆29Updated 2 years ago
- Takes a list of domains as the input, checks if they have a security.txt, outputs the results.☆14Updated 4 years ago
- A Broken-URL Checker☆79Updated 7 years ago
- Tooling and commands for common red team and Infrastructure testing tasks☆42Updated 2 years ago
- Extract subdomains from rapiddns.io☆23Updated 2 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆93Updated 4 years ago
- Validate proxies for specific domain☆35Updated 3 years ago
- Hacked together script for feeding urls into Burp's Sitemap☆93Updated 2 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆44Updated 2 years ago