syztem4our666 / zsh-pentesterLinks
Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting
☆15Updated 9 months ago
Alternatives and similar repositories for zsh-pentester
Users that are interested in zsh-pentester are comparing it to the libraries listed below
Sorting:
- Burp extension used to snip any header from all the requests.☆23Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- Monitor your target continuously for new subdomains!☆24Updated 2 years ago
- Manage attack surface data on Elasticsearch☆23Updated last year
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆24Updated last year
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- Unauthorized Access to Metadata and User Data like CTF☆27Updated 11 months ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated 2 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Updated last year
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Reversing Citrix Gateway for XSS☆17Updated 2 years ago
- convert secret patterns to gf compatible.☆39Updated 2 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Updated last year
- Automated HTTP Request Repeating With Burp Suite☆40Updated 2 years ago
- ☆13Updated 7 months ago
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Updated 3 years ago
- Tool for scanning domains for .git directories.☆16Updated 2 years ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆15Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 4 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆14Updated 3 weeks ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated last year
- ☆19Updated 2 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆18Updated 4 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆28Updated 2 years ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆12Updated 10 months ago