shellhunter / gocewlLinks
gocewl is a commandline tool to generate custom wordlists by crawling webpages
☆47Updated 5 years ago
Alternatives and similar repositories for gocewl
Users that are interested in gocewl are comparing it to the libraries listed below
Sorting:
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆48Updated 2 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆90Updated 5 years ago
- Dump exposed HTTP .git fast☆50Updated 2 years ago
- A dockerized, improved version of the Impacket smbserver.py☆40Updated 6 years ago
- Writeup of CVE-2020-15906☆49Updated 4 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Updated 5 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Golang Implant & Post-Exploitation Framework☆59Updated 2 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- A web shell for pivoting and lateral movement☆34Updated 7 years ago
- Validate proxies for specific domain☆37Updated 4 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- DNS server for pentesters☆49Updated 3 years ago
- DO NOT RUN THIS.☆47Updated 4 years ago
- Inspired by gowitness and EyeWitness☆15Updated 7 months ago
- Cloud Discovery - brute force public AWS, GCP, Alibaba, and Azure cloud services☆24Updated 4 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- Offensive Security recon tool☆92Updated 4 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Updated 5 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 3 years ago
- Escaping Restricted Environments and Bypassing DLP☆74Updated 6 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 5 years ago
- ☆54Updated 4 years ago
- Gmail Enumeration using a glitch described here https://blog.0day.rocks/abusing-gmail-to-get-previously-unlisted-e-mail-addresses-41544b6…☆28Updated 3 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆55Updated 5 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆86Updated 2 years ago
- Electron based screenshot scanner☆68Updated 2 years ago