WPScan rewritten in Python + some WPSeku ideas
☆650Jun 4, 2021Updated 4 years ago
Alternatives and similar repositories for Wordpresscan
Users that are interested in Wordpresscan are comparing it to the libraries listed below
Sorting:
- Another web vulnerabilities scanner, this extension works on Chrome and Opera☆470Sep 22, 2019Updated 6 years ago
- Python script to detect vulnerabilities inside PHP source code using static analysis, based on regex☆419Feb 27, 2025Updated last year
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,044Nov 24, 2019Updated 6 years ago
- Wordpress Attack Suite☆973Feb 16, 2021Updated 5 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs☆2,519Apr 9, 2024Updated last year
- Automatic SSRF fuzzer and exploitation tool☆3,493Sep 4, 2025Updated 6 months ago
- Drupal enumeration & exploitation tool☆610Nov 4, 2020Updated 5 years ago
- WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websit…☆9,504Feb 16, 2026Updated 3 weeks ago
- Advanced reconnaissance utility☆995Nov 20, 2023Updated 2 years ago
- Plecost - Wordpress finger printer Tool☆345Mar 1, 2023Updated 3 years ago
- Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.☆223Oct 16, 2023Updated 2 years ago
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/☆1,173Sep 11, 2024Updated last year
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,916Apr 13, 2022Updated 3 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,903Sep 27, 2021Updated 4 years ago
- Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.☆81Aug 28, 2017Updated 8 years ago
- Command line utility for searching and downloading exploits☆1,813Sep 10, 2025Updated 6 months ago
- GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)☆1,631Mar 11, 2024Updated last year
- Web Content Discovery Tool☆908Jun 7, 2024Updated last year
- Striker is an offensive information and vulnerability scanner.☆2,318Jun 4, 2023Updated 2 years ago
- JShell - Get a JavaScript shell with XSS.☆532May 5, 2019Updated 6 years ago
- Attack Surface Management Platform☆9,435Feb 15, 2026Updated 3 weeks ago
- This tool can be used to brute discover GET and POST parameters☆1,393Aug 24, 2019Updated 6 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,482Oct 12, 2024Updated last year
- A default credential scanner.☆1,503Jul 8, 2025Updated 8 months ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- Tulpar - Web Vulnerability Scanner☆200Dec 8, 2019Updated 6 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,379May 22, 2020Updated 5 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,284Aug 18, 2025Updated 6 months ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,185Dec 11, 2022Updated 3 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆326Apr 26, 2020Updated 5 years ago
- Detect and bypass web application firewalls and protection systems☆2,872Aug 11, 2024Updated last year
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed b…☆1,027Feb 5, 2021Updated 5 years ago
- Multi Tool Subdomain Enumeration☆723Apr 11, 2021Updated 4 years ago
- Automatic SQL injection with Charles and sqlmap api☆820May 1, 2018Updated 7 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆153Oct 20, 2018Updated 7 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,123Apr 21, 2024Updated last year