thelicato / fireLinks
Take domains on stdin and output them on stdout if they get resolved
☆33Updated 3 years ago
Alternatives and similar repositories for fire
Users that are interested in fire are comparing it to the libraries listed below
Sorting:
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated 2 years ago
- Validate proxies for specific domain☆37Updated 4 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 4 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- ☆26Updated 3 years ago
- Ffuf output browser☆39Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Python script to launch burp scans automatically☆33Updated 4 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆84Updated 5 months ago
- ☆10Updated 6 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- ☆54Updated 4 years ago
- Go module that returns supported regions for a service or supported services for a region☆16Updated last year
- Backend for Nuclear Pond☆22Updated last year
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆50Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Updated 3 years ago
- Dump exposed HTTP .git fast☆50Updated 3 years ago
- Default plugins for Jaeles Scanner☆35Updated 5 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Query various sources for CVE proof-of-concepts☆51Updated 2 years ago
- Inspired by gowitness and EyeWitness☆15Updated 8 months ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- A Burp Suite extension for headless, unattended scanning.☆37Updated 5 years ago
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago