ssb=simple subdomain bruteforcer
☆20Mar 10, 2023Updated 3 years ago
Alternatives and similar repositories for ssb
Users that are interested in ssb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 3 years ago
- Scan a host for open HTTP ports and gain information about the services present.☆12Jul 20, 2022Updated 3 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- ☆23Nov 19, 2019Updated 6 years ago
- A Hacking and Pentesting Tool for Windows☆20Jul 17, 2025Updated 9 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Spring4Shell (CVE-2022-22965)☆12Apr 7, 2022Updated 4 years ago
- [BASH] Wordpress bruteforce☆11Oct 9, 2020Updated 5 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- 🐱🏍红队小工具 | 自己编写的渗透中使用的各种脚本☆13Apr 13, 2023Updated 3 years ago
- script to brute force ssh or ftp passwords☆12Jul 22, 2016Updated 9 years ago
- Crackme collections☆14May 24, 2020Updated 5 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 8 months ago
- 兼容xray poc的漏洞扫描框架☆14Nov 16, 2023Updated 2 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Mar 29, 2016Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 2 months ago
- Whitenoise CTF I: Doves in the Wind☆20Oct 11, 2022Updated 3 years ago
- Vulnerable NodeJS Web Application☆97Aug 22, 2024Updated last year
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- mift - a mobile image forensic toolkit☆47Nov 14, 2023Updated 2 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- Wireless Pentest☆18Apr 5, 2018Updated 8 years ago
- Sphinx.bot is a platform for collecting data leaks. All information recorded here is publicly available on the web. Any malicious use of …☆50Jul 25, 2023Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆23May 8, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Hive, a major component of the CIA infrastructure to control its malware.☆17Dec 26, 2017Updated 8 years ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆73Dec 14, 2023Updated 2 years ago
- FourOhMe is a tool for testing HTTP headers on a website in order to try to bypass 40* HTTP codes. Written in Go, so easy to install and …☆24Feb 5, 2024Updated 2 years ago
- A NodeJS client for BigDataCloud API connectivity☆14Mar 14, 2026Updated last month
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 4 years ago
- DarkSpy facilitates a secure and educational environment to comprehend the mechanics of establishing connections between two machines. Th…☆52Jan 20, 2026Updated 3 months ago
- Encode, Decode and Crack encoded data, useful to crack some random encoded strings in CTFs.☆20Jun 25, 2024Updated last year
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- Research framework for reverse engineering and cheat prototyping in Counter-Strike 2. Developed as part of a Master’s Thesis at UC3M.☆59Apr 6, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Obtain the passphrase of a private key (id_rsa), this tool uses the ssh-keygen binary to perform a brute force attack until a successful …☆88Jun 20, 2025Updated 10 months ago
- DOOM port for Serenity☆32Aug 1, 2023Updated 2 years ago
- Golang network scanner with arp discovery and own parser☆87Mar 10, 2022Updated 4 years ago
- Resources for AD penetration testing and security☆33Feb 21, 2022Updated 4 years ago
- Module of FreePBX (IVR) :: Creates Digital Receptionist (aka Auto-Attendant, aka Interactive Voice Response) menus. These can be used to …☆18Apr 1, 2025Updated last year
- Yet another PHP Obfuscator☆33Jan 28, 2026Updated 3 months ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Feb 14, 2022Updated 4 years ago