FileFetcher is a Python tool that extracts and filters URLs from archived Wayback Machine data based on file types like .pdf, .zip, .sql, and more. It checks the availability of each URL, saving valid ones with a 200 OK response to a text file, ideal for research or web scraping.
☆19Jan 16, 2025Updated last year
Alternatives and similar repositories for FileFetcher
Users that are interested in FileFetcher are comparing it to the libraries listed below
Sorting:
- URLs for Exploit (UFX) is a powerful, modular, and extensible tool designed for security researchers, penetration testers, and developers…☆17Jan 30, 2025Updated last year
- A simple bash script for Web Cache Deception exploitation.☆16Oct 7, 2024Updated last year
- Master Your Money: Effortless Tracking and Smarter Spending☆12Mar 17, 2024Updated 2 years ago
- sms bomber in django☆14May 28, 2021Updated 4 years ago
- Subdosec is a fast, accurate subdomain takeover scanner with no false positives. It also offers a database of sites vulnerable to subdoma…☆60Feb 24, 2026Updated 3 weeks ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆18May 19, 2024Updated last year
- A surveillance kit to protect my house (Hopefully)☆21Sep 26, 2022Updated 3 years ago
- All Items Related to bug bounty☆13Aug 8, 2025Updated 7 months ago
- command-line tool designed to rapidly scan decompiled Android applications for hardcoded secrets. It moves beyond simple keyword searchi…☆42Aug 5, 2025Updated 7 months ago
- Pler - Domain Probe and Cloudflare Filter Tool. Pler is a simple yet powerful Python script to check whether a domain is using Cloudflare…☆22Aug 12, 2025Updated 7 months ago
- ssh user enumeration☆12Mar 21, 2023Updated 3 years ago
- This github repository contains links/tools that a cybersec specialist can use in his work. Some of the sites included might require regi…☆34Apr 3, 2023Updated 2 years ago
- :)☆12Mar 24, 2021Updated 4 years ago
- AI-Driven Breach and Attack Simulation Tool (Initial Proof of Concept for AI Pentest Copilot)☆26Jan 6, 2025Updated last year
- Google Dork Scanner for Google Chrome Extension☆17May 10, 2025Updated 10 months ago
- Designed to demonstrate how hackers can obtain detailed information about target devices through a simple link, Get-INFO serves as both a…☆32Aug 3, 2025Updated 7 months ago
- Simple XSS vulnerability checker tool very useful with xsschecker.☆28Nov 21, 2025Updated 4 months ago
- ☆483Aug 21, 2025Updated 7 months ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated 2 years ago
- Cadence suite enabling Hybrid Custody on Flow☆17Nov 22, 2024Updated last year
- Grab form parameters easily☆14Dec 11, 2024Updated last year
- A collaborative hub for Nuclei templates. Contribute, share, and explore powerful vulnerability detection tools!☆50Feb 1, 2025Updated last year
- ☆11Apr 23, 2025Updated 10 months ago
- Minimalist library for LLM usage☆13Sep 7, 2025Updated 6 months ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- ☆18Apr 26, 2025Updated 10 months ago
- ☆16Jun 11, 2022Updated 3 years ago
- Asynchronous scanning library☆21Nov 13, 2014Updated 11 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- This repository contains a proof-of-concept exploit script for CVE-2025-32432, a pre-authentication Remote Code Execution (RCE) vulnerabi…☆24Apr 27, 2025Updated 10 months ago
- OpenRedirector is a powerful automation tool for detecting Open Redirect vulnerabilities in web applications☆17Oct 30, 2025Updated 4 months ago
- This python based tool can be used to discover API keys, access tokens, and other sensitive data in JavaScript files. It can scan JavaScr…☆15Oct 18, 2024Updated last year
- Android Dynamic Class Dumper — dump all DEX files from running Android apps using Frida☆40Feb 16, 2026Updated last month
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆83Apr 12, 2025Updated 11 months ago
- ☆28Jun 5, 2023Updated 2 years ago
- Javascript file change monitoring☆17Mar 13, 2026Updated last week
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Dec 10, 2024Updated last year
- Automate Recon XSS Bug Bounty☆179Mar 9, 2026Updated last week