ytisf / BirDusterLinks
A multi threaded Python script designed to brute force directories and files names on webservers.
☆77Updated 3 years ago
Alternatives and similar repositories for BirDuster
Users that are interested in BirDuster are comparing it to the libraries listed below
Sorting:
- Create visualization from Shodan query☆74Updated 4 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆90Updated last year
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆80Updated 4 years ago
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆49Updated 5 months ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆61Updated 4 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆96Updated 3 years ago
- ☆53Updated 4 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web appl…☆27Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆63Updated 2 years ago
- A WLAN red team framework.☆156Updated 9 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- Red Team tools, infrastructure, and hardware weaponized☆106Updated last month
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆54Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Run search-that-hash from Google colab with fast offline (hashcat) mode☆35Updated 4 years ago
- Low Interaction Mobile Honeypot☆94Updated 3 weeks ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Tool to find SMTP servers vulnerable to open relay☆80Updated 5 years ago
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Updated 2 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- The DNS Hunt will make your life easier, and of course faster.☆47Updated 4 years ago
- fsp - Firestore Database Vulnerability Scanner Using APKs☆64Updated 4 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 3 years ago
- Dorks for Google, Shodan and BinaryEdge☆144Updated 5 years ago
- Deploy your own lab of web application penetration testing with docker and docker-compose, webgoat, dvwap, bwapp and Juice Shop☆71Updated 3 years ago