FileFetcher is a Python tool that extracts and filters URLs from archived Wayback Machine data based on file types like .pdf, .zip, .sql, and more. It checks the availability of each URL, saving valid ones with a 200 OK response to a text file, ideal for research or web scraping.
☆20Jan 16, 2025Updated last year
Alternatives and similar repositories for FileFetcher
Users that are interested in FileFetcher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- URLs for Exploit (UFX) is a powerful, modular, and extensible tool designed for security researchers, penetration testers, and developers…☆17Jan 30, 2025Updated last year
- A simple bash script for Web Cache Deception exploitation.☆16Oct 7, 2024Updated last year
- Master Your Money: Effortless Tracking and Smarter Spending☆12Mar 17, 2024Updated 2 years ago
- Script that I used for the Portswigger lab: Lab: Blind SQL injection with conditional errors☆12Jun 17, 2024Updated last year
- ☆12Jan 23, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Subdosec is a fast, accurate subdomain takeover scanner with no false positives. It also offers a database of sites vulnerable to subdoma…☆61Feb 24, 2026Updated last month
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆18May 19, 2024Updated last year
- All Items Related to bug bounty☆13Aug 8, 2025Updated 8 months ago
- command-line tool designed to rapidly scan decompiled Android applications for hardcoded secrets. It moves beyond simple keyword searchi…☆42Aug 5, 2025Updated 8 months ago
- Pler - Domain Probe and Cloudflare Filter Tool. Pler is a simple yet powerful Python script to check whether a domain is using Cloudflare…☆22Aug 12, 2025Updated 8 months ago
- ssh user enumeration☆12Mar 21, 2023Updated 3 years ago
- A fast and efficient subdomain hijacking scanner that checks for takeover vulnerabilities by matching HTTP response bodies against predef…☆29Dec 21, 2025Updated 3 months ago
- :)☆12Mar 24, 2021Updated 5 years ago
- AI-Driven Breach and Attack Simulation Tool (Initial Proof of Concept for AI Pentest Copilot)☆26Jan 6, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Google Dork Scanner for Google Chrome Extension☆17May 10, 2025Updated 11 months ago
- Designed to demonstrate how hackers can obtain detailed information about target devices through a simple link, Get-INFO serves as both a…☆32Aug 3, 2025Updated 8 months ago
- In Detail Methodology of How I perform Web Pentesting☆10Oct 18, 2025Updated 5 months ago
- Writeup Template. Feel free to replicate but please give me credit!☆13Nov 7, 2025Updated 5 months ago
- Simple XSS vulnerability checker tool very useful with xsschecker.☆28Nov 21, 2025Updated 4 months ago
- A Project Made To Centralize Various APIs 📖 No Authorization Needed :)☆10Jul 7, 2024Updated last year
- ☆506Aug 21, 2025Updated 7 months ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Cadence suite enabling Hybrid Custody on Flow☆17Updated this week
- Grab form parameters easily☆14Dec 11, 2024Updated last year
- A collaborative hub for Nuclei templates. Contribute, share, and explore powerful vulnerability detection tools!☆50Feb 1, 2025Updated last year
- ☆11Apr 23, 2025Updated 11 months ago
- Minimalist library for LLM usage☆13Sep 7, 2025Updated 7 months ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- ☆18Apr 26, 2025Updated 11 months ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆43Feb 22, 2026Updated last month
- Applications for USB missile launchers☆10Jun 24, 2013Updated 12 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆16Jun 11, 2022Updated 3 years ago
- Asynchronous scanning library☆21Nov 13, 2014Updated 11 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- Create a monster on Flow☆18Sep 26, 2024Updated last year
- Most powerfull Wifi Jammier.with fixes.☆13Oct 14, 2022Updated 3 years ago
- This repository contains a proof-of-concept exploit script for CVE-2025-32432, a pre-authentication Remote Code Execution (RCE) vulnerabi…☆24Apr 27, 2025Updated 11 months ago
- OpenRedirector is a powerful automation tool for detecting Open Redirect vulnerabilities in web applications☆17Oct 30, 2025Updated 5 months ago