xtormin / Funter
Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.
☆18Updated last year
Alternatives and similar repositories for Funter:
Users that are interested in Funter are comparing it to the libraries listed below
- An automated e-mail OSINT tool☆21Updated 3 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- Simple Bash Script For Collecting Wordpress Username☆21Updated 4 years ago
- Hax is a mini-tool with really useful hacking tools.☆18Updated last year
- Ded Security Framework is a tool aimed at security professionals☆35Updated 11 months ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 8 months ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆9Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆39Updated 7 months ago
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24Updated 2 years ago
- ☆12Updated 2 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated 2 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆18Updated 4 years ago
- Another vulnerability scanner☆19Updated last month
- Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and …☆17Updated 2 years ago
- xdebug 2.5.5 RCE exploit☆30Updated 3 months ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Updated 3 years ago
- ☆27Updated 2 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆23Updated 3 years ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- B-UAC, Windows UAC Bypass Trojan Generator☆8Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆16Updated 3 years ago
- ☆17Updated 5 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali now with windows support☆9Updated last month
- BAT is a tool to help everyone to securing their web-servers.☆12Updated 4 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆47Updated last year
- VLAN attacks toolkit☆14Updated 2 years ago