tasooshi / brutasLinks
Wordlists handcrafted (and automated) with ♥
☆219Updated 2 months ago
Alternatives and similar repositories for brutas
Users that are interested in brutas are comparing it to the libraries listed below
Sorting:
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆93Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated last week
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆108Updated 5 months ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆347Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 10 months ago
- Easy red team phishing with Puppeteer☆131Updated 2 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆123Updated 2 years ago
- Mining URLs from Wayback Machine for bug hunting/fuzzing/further probing☆55Updated last year
- Simple HTTP listener for security testing☆114Updated 6 months ago
- Automate Scoping, OSINT and Recon assessments.☆95Updated 4 months ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆128Updated 3 years ago
- A WLAN red team framework.☆155Updated 7 months ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆96Updated last year
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆73Updated last year
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆196Updated 6 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆131Updated 10 months ago
- Browser extension that extracts users from LinkedIn company pages☆160Updated 2 years ago
- Turns any junk text into a usable wordlist for brute-forcing.☆221Updated last year
- Generate graphs and charts based on password cracking result☆161Updated 2 years ago
- parse nmap files☆151Updated last year
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆176Updated 4 months ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆77Updated last year
- Session Hijacking Visual Exploitation☆200Updated last year
- Custom scan profiles for use with Burp Suite Pro☆143Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆150Updated 6 months ago
- ☆68Updated last year
- Prototype pollution scanner using headless chrome☆218Updated 2 years ago
- ☆139Updated last year