A multi threaded Python script designed to brute force directories and files names on webservers.
☆80May 20, 2022Updated 3 years ago
Alternatives and similar repositories for BirDuster
Users that are interested in BirDuster are comparing it to the libraries listed below
Sorting:
- A simple Python tool to harvest email addresses from Google.☆17Jan 8, 2015Updated 11 years ago
- Public exploits (re)writed while learning.☆14Aug 7, 2013Updated 12 years ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- General tools and scripts i want to make public to the world.☆46Apr 14, 2019Updated 6 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- Customisable PCAP parser and research assistant☆26Jan 8, 2018Updated 8 years ago
- PRESTASHOP Modules Shell Exploit☆11Sep 9, 2017Updated 8 years ago
- ☆10Apr 10, 2024Updated last year
- ☆13Nov 24, 2021Updated 4 years ago
- Ghidra's development plugins, scripts, contributing. Presentation☆13Aug 10, 2020Updated 5 years ago
- Windows Oracle Database Attack Toolkit☆80Jul 30, 2022Updated 3 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Nov 27, 2016Updated 9 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- x64dbg Malware Plugin. Detect malicious materials☆16Jun 13, 2020Updated 5 years ago
- ☆13Jan 17, 2026Updated last month
- ☆21Jan 10, 2022Updated 4 years ago
- D3Ext's Forward Shell☆120Oct 15, 2023Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- Just a better dirbuster☆13Dec 8, 2022Updated 3 years ago
- A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitter☆16Dec 9, 2019Updated 6 years ago
- A testing Red Team Infrastructure created with Docker☆32Apr 5, 2022Updated 3 years ago
- A script for automatize boolean-based blind SQL injections (MVP).☆54Aug 29, 2022Updated 3 years ago
- ☆14May 30, 2018Updated 7 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆162Dec 19, 2021Updated 4 years ago
- BoB Web Application Security Project☆220Dec 14, 2025Updated 2 months ago
- Nmap Web Dashboard and Reporting☆34May 1, 2022Updated 3 years ago
- scscanner is tool to read website status code response from the lists.☆39May 27, 2023Updated 2 years ago
- Red Team Server (RTS)☆16Mar 8, 2024Updated last year
- GPLv2 tool that auto-reverse-engineers Android applications and rips out sensitive API calls. Its awesome.☆23Mar 25, 2013Updated 12 years ago
- Plugin packages that provide custom visualizations and analytics capabilities to Trisul Network Analytics.☆17Jan 27, 2026Updated last month
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- Verdict-as-a-Service SDKs: Analyze files for malicious content☆38Feb 27, 2026Updated last week
- Batch IP geolocation script.☆21Jul 13, 2017Updated 8 years ago
- XSS Fuzz Swiss Knife on any URI☆15Aug 3, 2019Updated 6 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆278Jan 14, 2023Updated 3 years ago