underflow3d / dirbrute
A lightweight and simple directory buster.
☆16Updated last year
Alternatives and similar repositories for dirbrute:
Users that are interested in dirbrute are comparing it to the libraries listed below
- ☆10Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 6 months ago
- Material i gathered for the Offensive Security Certified Professional OSCP☆14Updated 6 years ago
- ReGen is a utility tool simplifying Regex creation by selecting values from logs or text. It enhances efficiency for digital forensics, d…☆21Updated last year
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆44Updated 4 months ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆37Updated 4 months ago
- Config files for my GitHub profile.☆28Updated last year
- Collection of some pentesting and bugbounty resources☆43Updated 2 years ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆71Updated 6 months ago
- ☆12Updated 2 years ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆51Updated 5 months ago
- Scripts, POCs & bullshit☆25Updated last month
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆27Updated last month
- Subdomain Bruteforce - Bounty Quick Code☆30Updated 4 months ago
- Ultimate Google Dork Lists OSWP top 10☆51Updated 5 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆32Updated last year
- Find secrets and passwords in container images and file systems☆11Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆34Updated 6 months ago
- ☆27Updated 2 years ago
- A tool for Subdomain takeovers detection☆26Updated 2 years ago
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆55Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 2 years ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆57Updated 2 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 4 months ago
- An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.☆15Updated last month
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆42Updated 3 years ago
- ☆34Updated last year
- This script reads a text file containing domains, fetches the subdomains from crt.sh☆10Updated last year
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆22Updated 3 years ago