FileFetcher is a Python tool that extracts and filters URLs from archived Wayback Machine data based on file types like .pdf, .zip, .sql, and more. It checks the availability of each URL, saving valid ones with a 200 OK response to a text file, ideal for research or web scraping.
☆20Jan 16, 2025Updated last year
Alternatives and similar repositories for FileFetcher
Users that are interested in FileFetcher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- URLs for Exploit (UFX) is a powerful, modular, and extensible tool designed for security researchers, penetration testers, and developers…☆17Jan 30, 2025Updated last year
- Script that I used for the Portswigger lab: Lab: Blind SQL injection with conditional errors☆12Jun 17, 2024Updated last year
- Subdosec is a fast, accurate subdomain takeover scanner with no false positives. It also offers a database of sites vulnerable to subdoma…☆61Feb 24, 2026Updated 2 months ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆17May 19, 2024Updated 2 years ago
- All Items Related to bug bounty☆13Aug 8, 2025Updated 9 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- command-line tool designed to rapidly scan decompiled Android applications for hardcoded secrets. It moves beyond simple keyword searchi…☆43Aug 5, 2025Updated 9 months ago
- Pler - Domain Probe and Cloudflare Filter Tool. Pler is a simple yet powerful Python script to check whether a domain is using Cloudflare…☆22Aug 12, 2025Updated 9 months ago
- ssh user enumeration☆13Mar 21, 2023Updated 3 years ago
- A fast and efficient subdomain hijacking scanner that checks for takeover vulnerabilities by matching HTTP response bodies against predef…☆30Apr 12, 2026Updated last month
- :)☆12Mar 24, 2021Updated 5 years ago
- AI-Driven Breach and Attack Simulation Tool (Initial Proof of Concept for AI Pentest Copilot)☆27Jan 6, 2025Updated last year
- Designed to demonstrate how hackers can obtain detailed information about target devices through a simple link, Get-INFO serves as both a…☆32Aug 3, 2025Updated 9 months ago
- In Detail Methodology of How I perform Web Pentesting☆10Oct 18, 2025Updated 7 months ago
- Writeup Template. Feel free to replicate but please give me credit!☆13Nov 7, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Simple XSS vulnerability checker tool very useful with xsschecker.☆27Nov 21, 2025Updated 6 months ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 3 years ago
- ☆516Aug 21, 2025Updated 9 months ago
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated 2 years ago
- Cadence suite enabling Hybrid Custody on Flow☆17Apr 9, 2026Updated last month
- Grab form parameters easily☆14Dec 11, 2024Updated last year
- A collaborative hub for Nuclei templates. Contribute, share, and explore powerful vulnerability detection tools!☆50Feb 1, 2025Updated last year
- Minimalist library for LLM usage☆13Sep 7, 2025Updated 8 months ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A simple browser extension to blur or highlight elements on any webpage.☆29Sep 30, 2025Updated 7 months ago
- ☆18Apr 26, 2025Updated last year
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆45Feb 22, 2026Updated 3 months ago
- Asynchronous scanning library☆21Nov 13, 2014Updated 11 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- ☆16Jun 11, 2022Updated 3 years ago
- Create a monster on Flow☆18Sep 26, 2024Updated last year
- Most powerfull Wifi Jammier.with fixes.☆12Oct 14, 2022Updated 3 years ago
- This repository contains a proof-of-concept exploit script for CVE-2025-32432, a pre-authentication Remote Code Execution (RCE) vulnerabi…☆25Apr 27, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- OpenRedirector is a powerful automation tool for detecting Open Redirect vulnerabilities in web applications☆18Oct 30, 2025Updated 6 months ago
- This script checks the status of URLs to see if they are alive or not.☆13Nov 22, 2024Updated last year
- This python based tool can be used to discover API keys, access tokens, and other sensitive data in JavaScript files. It can scan JavaScr…☆15Oct 18, 2024Updated last year
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆515Updated this week
- AI-assisted development fork of Obtainium with extra features.☆71May 13, 2026Updated last week
- 解锁Py3 ‖ Pydroid 3 Premium☆17Nov 2, 2025Updated 6 months ago
- An SQLite web-based interface for serving an SQLite editor web application☆46Sep 26, 2025Updated 7 months ago