varppi / ssbLinks
ssb=simple subdomain bruteforcer
β19Updated 2 years ago
Alternatives and similar repositories for ssb
Users that are interested in ssb are comparing it to the libraries listed below
Sorting:
- β133Updated 2 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux πΎβ73Updated 2 years ago
- Sifter - All purpose penetration testing op-centerβ81Updated 3 years ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSecβ64Updated 4 years ago
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.β111Updated 2 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.β68Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagβ¦β119Updated 2 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proceβ¦β26Updated 2 years ago
- Bash script for CTF automating basic enumerationβ42Updated 3 years ago
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securiβ¦β24Updated 3 years ago
- Hacking with PasteJacking techniqueβ22Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.β101Updated last year
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.β107Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actualβ¦β69Updated 4 years ago
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328β88Updated last year
- β12Updated 3 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its pβ¦β59Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.β64Updated 3 years ago
- The DNS Hunt will make your life easier, and of course faster.β47Updated 5 years ago
- Windows Reverse TCP Shell for Hacking and Pentestingβ24Updated last year
- Multi-threaded URL enumeration/content-discovery tool in Python.β107Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP β¦β37Updated 2 years ago
- Crawls URL to get a better image of what is tied to a website.β33Updated 2 years ago
- Ded Security Framework is a tool aimed at security professionalsβ35Updated last year
- DarkSpy facilitates a secure and educational environment to comprehend the mechanics of establishing connections between two machines. Thβ¦β49Updated last year
- An Encrypted File transfer via AES-256-CBCβ52Updated 4 years ago
- Social Engineering Browser Update Attack.β59Updated 2 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC connβ¦β10Updated 2 years ago
- Scripts, POCs & bullshitβ31Updated 6 months ago
- Obtain the passphrase of a private key (id_rsa), this tool uses the ssh-keygen binary to perform a brute force attack until a successful β¦β80Updated 6 months ago