ytisf / BirDusterLinks
A multi threaded Python script designed to brute force directories and files names on webservers.
☆79Updated 3 years ago
Alternatives and similar repositories for BirDuster
Users that are interested in BirDuster are comparing it to the libraries listed below
Sorting:
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- Create visualization from Shodan query☆75Updated 4 years ago
- Free Advance encryptor for Anon Cloud☆16Updated 2 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆92Updated 3 months ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆98Updated 4 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- ☆72Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Hacking, pen-testing, and cyber-security related tools built with Python.☆35Updated 5 years ago
- ☆53Updated 4 years ago
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆51Updated 10 months ago
- Top password lists generated from leaks collected from different paste sites☆32Updated 3 years ago
- A WLAN red team framework.☆154Updated last year
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆81Updated 4 years ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆56Updated 3 years ago
- Enumerate a target Based off of Nmap Results☆76Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆66Updated 3 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web appl…☆26Updated 2 months ago
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Updated 2 years ago
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 3 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆59Updated 4 years ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆73Updated 2 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- Repository of tools used in my blog☆51Updated last year
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 4 years ago
- Low Interaction Mobile Honeypot☆96Updated 6 months ago
- Small python script to look for common vulnerabilities on SMTP server.☆49Updated 2 years ago