tasooshi / brutasLinks
Wordlists handcrafted (and automated) with ♥
☆217Updated 3 weeks ago
Alternatives and similar repositories for brutas
Users that are interested in brutas are comparing it to the libraries listed below
Sorting:
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆128Updated 3 years ago
- parse nmap files☆153Updated 2 months ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆97Updated last year
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆110Updated 2 weeks ago
- Opensource assets and vulnerability scanning tool☆183Updated 2 months ago
- Browser extension that extracts users from LinkedIn company pages☆160Updated 2 years ago
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.com☆106Updated 3 years ago
- Automate Scoping, OSINT and Recon assessments.☆95Updated 6 months ago
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆198Updated 9 months ago
- ☆68Updated 2 years ago
- A curated list wordlists for bruteforcing and fuzzing☆83Updated 2 years ago
- Sample Obsidian's vault for web pentesting☆99Updated last year
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆130Updated 3 years ago
- ☆55Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- ☆56Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆161Updated 2 weeks ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- MayorSec DNS Enumeration Tool☆87Updated 9 months ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆184Updated last year
- Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework☆168Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆179Updated last year
- this script will help you find favicon hashes which you can use to shodan to get more details about an asset☆28Updated 5 months ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆78Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆150Updated 2 weeks ago
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆109Updated 2 years ago
- HTTP verb tampering & methods enumeration☆62Updated 3 weeks ago
- AWS, Azure, Alibaba and Google bucket scanner☆158Updated 2 years ago