Enumeration & fingerprint tool
☆23Mar 3, 2024Updated 2 years ago
Alternatives and similar repositories for DirRunner
Users that are interested in DirRunner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A C2 framework inspired by anime, made in python.☆12Feb 8, 2026Updated last month
- Web scraping | Website cloner | Path Traversal Scanner☆16Sep 27, 2025Updated 5 months ago
- Make an Linux Kernel rootkit visible again.☆59Feb 27, 2025Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 3 years ago
- ☆14Mar 6, 2025Updated last year
- Your subdomains are free for the taking - no API key, no mistaking! 🕺☆37Feb 27, 2023Updated 3 years ago
- A powerful subdomain enumeration tool that aggregates data from multiple sources to create comprehensive lists of root subdomains.☆47Dec 19, 2025Updated 3 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Feb 28, 2025Updated last year
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆12Nov 19, 2018Updated 7 years ago
- Actualización de Huron, distro Linux para Osint☆21Jul 30, 2019Updated 6 years ago
- A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.☆17Sep 30, 2025Updated 5 months ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Jan 20, 2023Updated 3 years ago
- Command line client for HackTheBox☆25Feb 26, 2024Updated 2 years ago
- ☆18Sep 24, 2024Updated last year
- aws cli pentesting/red team snippets☆33Jan 12, 2024Updated 2 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- Solving CTF, one pixel at a time☆26Apr 7, 2020Updated 5 years ago
- This is a simple process injection made in C for Linux systems☆29Sep 23, 2023Updated 2 years ago
- Helper for testing Lambda IAM Roles created by Serverless Framework.☆16Jun 22, 2025Updated 9 months ago
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago
- ☆25Sep 17, 2025Updated 6 months ago
- This is a simple example of DLL hijacking enabling proxy execution.☆70Apr 18, 2023Updated 2 years ago
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- Bug bounty domain manager with validation, exports & Redis storage ✨☆29Jun 5, 2025Updated 9 months ago
- CVE-2023-23192☆13Mar 27, 2023Updated 2 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Config files for my GitHub profile.☆31Mar 17, 2026Updated last week
- CEH v13 i-labs , CEH v13 Engage Answers☆34Jul 5, 2025Updated 8 months ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- List of all pastebin.com analogs I know of. They are useful for finding leaked personal data☆22Jul 18, 2021Updated 4 years ago
- FCracker is a command line tool designed to brute force encrypted files like zip, 7z, rar, pdf etc.☆36Mar 25, 2021Updated 4 years ago
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆44Apr 17, 2023Updated 2 years ago
- ☆40Jan 30, 2023Updated 3 years ago
- AWS Security Tool☆29Jan 1, 2024Updated 2 years ago
- This script monitors a Bitcoin wallet address and notifies the user when there are changes in the balance or new transactions.☆23Jul 11, 2023Updated 2 years ago
- ☆49Apr 9, 2025Updated 11 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- ☆18Aug 31, 2021Updated 4 years ago
- Scalable URL obfuscator service☆11Feb 14, 2023Updated 3 years ago