vulnersCom / api
Vulners Python API wrapper
☆360Updated last month
Alternatives and similar repositories for api:
Users that are interested in api are comparing it to the libraries listed below
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆481Updated 6 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆412Updated last year
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆418Updated 7 months ago
- Various Tools and Docker Images☆279Updated 6 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆380Updated 7 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆356Updated 2 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Updated 4 years ago
- Extract subdomains from SSL certificates in HTTPS sites.☆382Updated 3 weeks ago
- ⚠️WARNING: This project now become part of https://github.com/j3ssie/Metabigor project☆176Updated 5 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆318Updated 2 years ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆469Updated 2 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Updated 7 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆253Updated 7 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 4 years ago
- a CLI for ephemeral penetration testing☆12Updated 5 years ago
- Tools for auditing WAFS☆458Updated 4 years ago
- ☆603Updated 5 months ago
- ☆280Updated 4 years ago
- A security tool for grabbing screenshots of many web hosts☆318Updated 7 years ago
- A database of common, interesting or useful commands, in one handy referable form☆747Updated last year
- A webshell framework for penetration testers.☆297Updated 11 months ago
- Network reconnaissance and vulnerability assessment tools.☆399Updated 3 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆381Updated 5 years ago
- Nameserver DNS poisoning attacks made easy☆519Updated 8 years ago
- ADAPT is a tool that performs automated Penetration Testing for WebApps.☆189Updated 5 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆396Updated 4 years ago
- Easy-to-use live forensics toolbox for Linux endpoints☆405Updated last year
- A web front-end for password cracking and analytics☆623Updated 3 years ago