tasooshi / brutasLinks
Wordlists handcrafted (and automated) with ♥
☆219Updated 3 months ago
Alternatives and similar repositories for brutas
Users that are interested in brutas are comparing it to the libraries listed below
Sorting:
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆128Updated 3 years ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆94Updated last year
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated 6 months ago
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆176Updated 5 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆123Updated 2 years ago
- ☆68Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 11 months ago
- Collection of offensive tools targeting Microsoft Azure☆208Updated 2 years ago
- A WLAN red team framework.☆156Updated 8 months ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- Custom scan profiles for use with Burp Suite Pro☆144Updated last year
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆162Updated 2 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated last week
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆197Updated 7 months ago
- Browser extension that extracts users from LinkedIn company pages☆160Updated 2 years ago
- ☆55Updated last year
- ☆74Updated last year
- A repository with informtion related to Cloud Osint☆106Updated 2 months ago
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆129Updated 3 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆101Updated 2 weeks ago
- Easy red team phishing with Puppeteer☆131Updated 2 years ago
- parse nmap files☆149Updated 3 weeks ago
- Mining URLs from Wayback Machine for bug hunting/fuzzing/further probing☆55Updated last year
- ☆66Updated 3 years ago
- Automate Scoping, OSINT and Recon assessments.☆95Updated 4 months ago
- Sample Obsidian's vault for web pentesting☆97Updated 10 months ago
- HTTP verb tampering & methods enumeration☆59Updated 3 years ago
- AWS, Azure, Alibaba and Google bucket scanner☆151Updated last year
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆103Updated last year
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆182Updated 2 years ago