vulnersCom / api
Vulners Python API wrapper
☆357Updated last month
Related projects ⓘ
Alternatives and complementary repositories for api
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆410Updated last year
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆481Updated 6 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆379Updated 7 years ago
- ☆596Updated last month
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆416Updated 3 months ago
- A database of common, interesting or useful commands, in one handy referable form☆747Updated 9 months ago
- Various Tools and Docker Images☆278Updated 6 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Updated 4 years ago
- Tools for auditing WAFS☆457Updated 3 years ago
- Scripts that are useful for me on pen tests☆525Updated 2 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆505Updated 6 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆354Updated last year
- Easy-to-use live forensics toolbox for Linux endpoints☆406Updated 8 months ago
- Automates some pentest jobs via nmap xml file☆322Updated 6 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆270Updated 3 years ago
- WebApp Information Gatherer☆539Updated 6 years ago
- A web front-end for password cracking and analytics☆622Updated 2 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆465Updated 5 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆253Updated 7 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆143Updated 6 years ago
- Python framework for IT security tools☆260Updated 7 years ago
- Modern tactical exploitation toolkit.☆834Updated 4 months ago
- (extensible) Data Exfiltration Toolkit (DET)☆821Updated 7 years ago
- Machinae Security Intelligence Collector☆504Updated 6 months ago
- An intentionally designed broken web application based on REST API.☆570Updated 3 years ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆469Updated 2 years ago