varppi / ssbLinks
ssb=simple subdomain bruteforcer
☆19Updated 2 years ago
Alternatives and similar repositories for ssb
Users that are interested in ssb are comparing it to the libraries listed below
Sorting:
- Sifter - All purpose penetration testing op-center☆80Updated 2 years ago
- ☆133Updated 2 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆105Updated 2 years ago
- ☆12Updated 3 years ago
- Scripts, POCs & bullshit☆29Updated 3 months ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆63Updated 4 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆121Updated 2 years ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆73Updated 4 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated last year
- ☆159Updated 2 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆23Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆236Updated last year
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆111Updated 2 years ago
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24Updated 3 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆71Updated 2 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- Nmap & SQL injection automation tool☆36Updated 11 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆64Updated 4 years ago
- Bash script for CTF automating basic enumeration☆43Updated 3 years ago
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- Hacking with PasteJacking technique☆22Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆98Updated 10 months ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago
- Extendable Python script handler for automating penetration testing.☆40Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- ☆28Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Updated 3 years ago
- Automated exploit scanner for cameras on the internet☆202Updated last year