stealthcopter / CaidoExploitGeneratorLinks
β30Updated 7 months ago
Alternatives and similar repositories for CaidoExploitGenerator
Users that are interested in CaidoExploitGenerator are comparing it to the libraries listed below
Sorting:
- π A curated list of awesome Caido related projectsβ46Updated 10 months ago
- An AI-powered assistant for hackers and security professionals built for Caidoβ31Updated 2 weeks ago
- A powerful subdomain enumeration tool that aggregates data from multiple sources to create comprehensive lists of root subdomains.β43Updated last month
- Python script implementing the favicon hash trick to find subdomains.β38Updated 2 years ago
- A tech enumeration toolkit focused on 404 Not found pages.β25Updated last year
- π οΈ Workflows created by the communityβ86Updated last month
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the dropletβ57Updated last year
- The Primate Pack is a suite of extensions for Caido.β14Updated last year
- A powerful Go tool for finding origin IPs of domains by querying multiple security APIs and validating results with built-in HTTP client.β42Updated 2 months ago
- Unicode Security Toolkitβ40Updated last year
- A really fast http prober.β41Updated 2 years ago
- π° Caido Plugin StarterKitβ34Updated last year
- Passive Web Vulnerability Detection Toolβ37Updated 9 months ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter namesβ40Updated last year
- Create your own recon & vulnerability scanner with Trickest and GitHubβ48Updated 2 years ago
- OWASP Foundation Web Respositoryβ26Updated 3 months ago
- Extract most frequent words in a list of subdomainsβ12Updated 11 months ago
- A tool to migrate Burpsuite HTTP history to Caidoβ35Updated 9 months ago
- Monitoring the Cloud Landscapeβ92Updated last week
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration testβ¦β37Updated last year
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting tβ¦β49Updated last year
- Generate a cross join, also known as a Cartesian product, from the lines of the specified files. This process is useful for creating fuzzβ¦β21Updated 2 years ago
- A powerful command-line tool for Google dorking, enabling users to uncover hidden information and vulnerabilities with advanced search quβ¦β28Updated 6 months ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!β21Updated last year
- A collection of one off hacks and simple scriptsβ27Updated 2 years ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gatheringβ‘.β60Updated last year
- Extracts URLs from OSINT Archives for Security Insightsβ173Updated this week
- Filter URLs to save your time.β60Updated 3 years ago
- Looks for parameters in urlsβ34Updated last year
- Micro-agent framework for Caidoβ28Updated 5 months ago