CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+51.67%)
Mutual labels: security-tools, pentesting, penetration-testing, security-audit, enumeration
Scilla🏴☠️ Information Gathering tool 🏴☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-3.33%)
Mutual labels: security-tools, pentesting, penetration-testing, enumeration, subdomain-scanner
NosqlmapAutomated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+1506.67%)
Mutual labels: security-tools, penetration-testing, security-audit, enumeration
JwtxploiterA tool to test security of json web token
Stars: ✭ 130 (+8.33%)
Mutual labels: security-tools, pentesting, penetration-testing, websecurity
Pentest NotesCollection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
Stars: ✭ 89 (-25.83%)
Mutual labels: security-tools, pentesting, penetration-testing, security-audit
ReconnoitreA security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+1420%)
Mutual labels: security-tools, penetration-testing, security-audit, enumeration
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+218.33%)
Mutual labels: security-tools, pentesting, penetration-testing, enumeration
HabuHacking Toolkit
Stars: ✭ 635 (+429.17%)
Mutual labels: security-tools, pentesting, penetration-testing, security-audit
RecsechRecsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected, Subdomain takeovers, Reconnaissance On Github and much more you can see in Features in tools .
Stars: ✭ 173 (+44.17%)
Mutual labels: security-tools, penetration-testing, security-audit, websecurity
FdsploitFile Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (+65.83%)
Mutual labels: security-tools, pentesting, penetration-testing, enumeration
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-48.33%)
Mutual labels: security-tools, pentesting, penetration-testing, security-audit
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+504.17%)
Mutual labels: security-tools, pentesting, security-audit
InterlaceEasily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+533.33%)
Mutual labels: security-tools, penetration-testing, enumeration
VhostscanA virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+539.17%)
Mutual labels: security-tools, penetration-testing, security-audit
Rapidscan🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+545.83%)
Mutual labels: security-tools, penetration-testing, enumeration
DirsearchWeb path scanner
Stars: ✭ 7,246 (+5938.33%)
Mutual labels: pentesting, penetration-testing, enumeration
EvillimiterTool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+536.67%)
Mutual labels: security-tools, pentesting, penetration-testing
SudomySudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 859 (+615.83%)
Mutual labels: pentesting, enumeration, subdomain-scanner
HashviewA web front-end for password cracking and analytics
Stars: ✭ 601 (+400.83%)
Mutual labels: security-tools, pentesting, penetration-testing
Active Directory Exploitation Cheat SheetA cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+625%)
Mutual labels: pentesting, penetration-testing, enumeration