tasooshi / brutasLinks
Wordlists handcrafted (and automated) with ♥
☆222Updated 3 months ago
Alternatives and similar repositories for brutas
Users that are interested in brutas are comparing it to the libraries listed below
Sorting:
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Updated 3 months ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆125Updated 3 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆182Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆118Updated 3 months ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆163Updated 7 months ago
- Search for sensitive data in Postman public library.☆216Updated 2 months ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆110Updated 2 years ago
- ☆74Updated last year
- ☆66Updated 2 years ago
- Opensource assets and vulnerability scanning tool☆185Updated 5 months ago
- Sample Obsidian's vault for web pentesting☆99Updated last year
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year
- this script will help you find favicon hashes which you can use to shodan to get more details about an asset☆29Updated 8 months ago
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.com☆107Updated 3 years ago
- A curated list wordlists for bruteforcing and fuzzing☆85Updated 2 years ago
- Browser extension that extracts users from LinkedIn company pages☆162Updated 2 years ago
- ☆57Updated 3 years ago
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆132Updated 3 years ago
- Custom scan profiles for use with Burp Suite Pro☆147Updated last year
- A Tool for Domain Flyovers☆124Updated last year
- Automate Scoping, OSINT and Recon assessments.☆99Updated 3 weeks ago
- Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework☆170Updated 2 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆110Updated 11 months ago
- HTTP verb tampering & methods enumeration☆62Updated 3 months ago
- parse nmap files☆155Updated 5 months ago
- Google Dork File Finder☆196Updated 10 months ago
- AWS, Azure, Alibaba and Google bucket scanner☆162Updated 2 years ago
- ☆66Updated 3 years ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆82Updated 2 years ago