tasooshi / brutas
Wordlists handcrafted (and automated) with ♥
☆190Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for brutas
- parse nmap files☆141Updated 9 months ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆126Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆148Updated this week
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆84Updated last year
- ☆64Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆175Updated 3 months ago
- Browser extension that extracts users from LinkedIn company pages☆155Updated last year
- MayorSec DNS Enumeration Tool☆76Updated last year
- Sample Obsidian's vault for web pentesting☆90Updated 3 months ago
- A WLAN red team framework.☆141Updated last month
- Custom scan profiles for use with Burp Suite Pro☆105Updated 7 months ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆104Updated 4 months ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- A repository with informtion related to Cloud Osint☆79Updated last week
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆145Updated 10 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆83Updated last year
- Turns any junk text into a usable wordlist for brute-forcing.☆217Updated 7 months ago
- How to search on the shodan.io website☆118Updated 4 years ago
- Self-hosted passive subdomain continous monitoring tool.☆154Updated 9 months ago
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆178Updated 10 months ago
- ☆75Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆200Updated last year
- Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework☆164Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆117Updated 2 years ago
- ☆53Updated 11 months ago
- AWS, Azure, Alibaba and Google bucket scanner☆120Updated last year
- A Tool for Domain Flyovers☆90Updated 2 months ago
- ☆121Updated 2 years ago
- Google Dork File Finder☆187Updated last year
- Network penetration testing toolset wrapper☆80Updated 2 years ago