thatstraw / pyscriptsforpentesters
This repository will contain python scripts for hackers and pentesters
☆25Updated 2 years ago
Alternatives and similar repositories for pyscriptsforpentesters:
Users that are interested in pyscriptsforpentesters are comparing it to the libraries listed below
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆38Updated last year
- List of Github repositories and articles with list of dorks for different search engines☆28Updated 2 years ago
- [EN] BETA: Layla - recon tool for bug bounty☆76Updated 3 years ago
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆37Updated 6 months ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Updated last year
- A collection of awesome software, OSINT Tools, libraries, learning tutorials, documents, books & technical resources and cool stuff about…☆44Updated 9 months ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆23Updated last year
- Hit valid URL☆22Updated 3 years ago
- Full Valid Fake Data Generator☆96Updated 4 months ago
- Better Google Dorking with Dorker.☆32Updated 2 years ago
- Some Notes because i am too lazy to search☆12Updated 3 years ago
- Yet another web recon tool☆62Updated last year
- Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web appl…☆26Updated 2 years ago
- In this repo I collect all commands, links, techniques and tricks i found during my work as pentester, hacker, OSCP student and hack the …☆63Updated 4 years ago
- Headless web crawler for bugbounty and penetration-testing/redteaming☆41Updated 10 months ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Mobile Pentesting Guide (WIP)☆24Updated 4 years ago
- Ultimate Google Dork Lists OSWP top 10☆53Updated 6 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆33Updated 3 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Updated 2 years ago
- Run search-that-hash from Google colab with fast offline (hashcat) mode☆34Updated 3 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.☆76Updated last year
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Updated 3 years ago
- A summary of the most abbreviations I encountered so far☆19Updated 3 weeks ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Updated 2 years ago
- [ Automated Web Vulnerability Scanner ]☆68Updated 4 years ago
- ☆51Updated last year
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆46Updated last year