All Projects → Arl → Similar Projects or Alternatives

880 Open source projects that are alternatives of or similar to Arl

Interlace
Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (-43.99%)
Mutual labels:  security-tools, bugbounty
3klcon
Automation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files.
Stars: ✭ 189 (-86.07%)
Mutual labels:  recon, bugbounty
Xrcross
XRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. This tool was built to test (XSS|SSRF|CORS|SSTI|IDOR|RCE|LFI|SQLI) vulnerabilities
Stars: ✭ 175 (-87.1%)
Mutual labels:  recon, bugbounty
Autorecon
Simple shell script for automated domain recognition with some tools
Stars: ✭ 244 (-82.02%)
Mutual labels:  recon, bugbounty
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+433.97%)
Mutual labels:  bugbounty, pentest-tool
Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-91.45%)
Mutual labels:  security-tools, recon
Dns Discovery
DNS-Discovery is a multithreaded subdomain bruteforcer.
Stars: ✭ 114 (-91.6%)
Mutual labels:  security-tools, bugbounty
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (-16.29%)
Mutual labels:  security-tools, pentest-tool
Bulwark
An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
Stars: ✭ 113 (-91.67%)
Mutual labels:  security-tools, bugbounty
Bbr
An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.
Stars: ✭ 142 (-89.54%)
Mutual labels:  security-tools, bugbounty
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+42.08%)
Mutual labels:  security-tools, bugbounty
Stacoan
StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.
Stars: ✭ 707 (-47.9%)
Mutual labels:  security-tools, bugbounty
Favfreak
Making Favicon.ico based Recon Great again !
Stars: ✭ 564 (-58.44%)
Mutual labels:  recon, bugbounty
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-86.59%)
Mutual labels:  security-tools, bugbounty
Intrec Pack
Intelligence and Reconnaissance Package/Bundle installer.
Stars: ✭ 177 (-86.96%)
Mutual labels:  security-tools, recon
Git Hound
Reconnaissance tool for GitHub code search. Finds exposed API keys using pattern matching, commit history searching, and a unique result scoring system.
Stars: ✭ 602 (-55.64%)
Mutual labels:  security-tools, recon
Reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (-28.22%)
Mutual labels:  recon, bugbounty
h1-search
Tool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.
Stars: ✭ 58 (-95.73%)
Mutual labels:  bugbounty, pentest-tool
credcheck
Credentials Checking Framework
Stars: ✭ 50 (-96.32%)
Mutual labels:  bugbounty, pentest-tool
Tools Tbhm
Tools of "The Bug Hunters Methodology V2 by @jhaddix"
Stars: ✭ 171 (-87.4%)
Mutual labels:  security-tools, bugbounty
Exploitpack
Exploit Pack -The next generation exploit framework
Stars: ✭ 728 (-46.35%)
Mutual labels:  security-tools, pentest-tool
ShadowClone
Unleash the power of cloud
Stars: ✭ 224 (-83.49%)
Mutual labels:  recon, bugbounty
WhoEnum
Mass querying whois records
Stars: ✭ 24 (-98.23%)
Mutual labels:  recon, bugbounty
Sub-Drill
A very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Stars: ✭ 70 (-94.84%)
Mutual labels:  recon, bugbounty
apkizer
apkizer is a mass downloader for android applications for all available versions.
Stars: ✭ 40 (-97.05%)
Mutual labels:  recon, bugbounty
SubWalker
Simultaneously execute various subdomain enumeration tools and aggregate results.
Stars: ✭ 26 (-98.08%)
Mutual labels:  recon, bugbounty
OffensiveCloudDistribution
Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.
Stars: ✭ 86 (-93.66%)
Mutual labels:  recon, bugbounty
pentesting-dockerfiles
Pentesting/Bugbounty Dockerfiles.
Stars: ✭ 148 (-89.09%)
Mutual labels:  bugbounty, pentest-tool
Yasuo
A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (-61.9%)
Mutual labels:  security-tools, pentest-tool
Priest
Extract server and IP address information from Browser SSRF
Stars: ✭ 13 (-99.04%)
Mutual labels:  recon, bugbounty
ORtester
Open Redirect scanner - (out of date)
Stars: ✭ 24 (-98.23%)
Mutual labels:  bugbounty, pentest-tool
Habu
Hacking Toolkit
Stars: ✭ 635 (-53.21%)
Mutual labels:  security-tools, pentest-tool
Bypass Firewalls By Dns History
Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.
Stars: ✭ 739 (-45.54%)
Mutual labels:  security-tools, bugbounty
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (-43.48%)
Mutual labels:  security-tools, bugbounty
YAPS
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-97.42%)
Mutual labels:  bugbounty, pentest-tool
Lazyrecon
An automated approach to performing recon for bug bounty hunting and penetration testing.
Stars: ✭ 282 (-79.22%)
Mutual labels:  recon, bugbounty
leaky-paths
A collection of special paths linked to major web CVEs, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to scan passively for high-quality endpoints and quick-wins.
Stars: ✭ 507 (-62.64%)
Mutual labels:  recon, bugbounty
Pompem
Find exploit tool
Stars: ✭ 786 (-42.08%)
Mutual labels:  security-tools, pentest-tool
Reconnote
Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
Stars: ✭ 322 (-76.27%)
Mutual labels:  security-tools, recon
Envizon
network visualization & vulnerability management/reporting
Stars: ✭ 382 (-71.85%)
Mutual labels:  security-tools, pentest-tool
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (-42.89%)
Mutual labels:  security-tools, pentest-tool
Subdomainizer
A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.
Stars: ✭ 915 (-32.57%)
Mutual labels:  security-tools, bugbounty
Censys Subdomain Finder
⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.
Stars: ✭ 402 (-70.38%)
Mutual labels:  pentest-tool, recon
Sn1per
Attack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+260.87%)
Mutual labels:  pentest-tool, security-tools
targets
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (-93.74%)
Mutual labels:  recon, bugbounty
Blackmamba
C2/post-exploitation framework
Stars: ✭ 544 (-59.91%)
Mutual labels:  security-tools, pentest-tool
Gitgot
Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.
Stars: ✭ 964 (-28.96%)
Mutual labels:  security-tools, recon
Awesome Oneliner Bugbounty
A collection of awesome one-liner scripts especially for bug bounty tips.
Stars: ✭ 594 (-56.23%)
Mutual labels:  recon, bugbounty
reconness-agents
Reconness Agents Script
Stars: ✭ 25 (-98.16%)
Mutual labels:  recon, bugbounty
Stowaway
👻Stowaway -- Multi-hop Proxy Tool for pentesters
Stars: ✭ 500 (-63.15%)
Mutual labels:  security-tools, pentest-tool
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (-43.7%)
Mutual labels:  security-tools, pentest-tool
Urlhunter
a recon tool that allows searching on URLs that are exposed via shortener services
Stars: ✭ 934 (-31.17%)
Mutual labels:  recon, bugbounty
Gitgraber
gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...
Stars: ✭ 1,164 (-14.22%)
Mutual labels:  security-tools, bugbounty
Kalitoolsmanual
Kali Linux 工具合集中文说明书
Stars: ✭ 70 (-94.84%)
Mutual labels:  security-tools
Patton
The clever vulnerability dependency finder
Stars: ✭ 87 (-93.59%)
Mutual labels:  security-tools
Intrigue Ident
Application and Service Fingerprinting
Stars: ✭ 70 (-94.84%)
Mutual labels:  security-tools
Free Security Resources
安全总是无处不在...
Stars: ✭ 69 (-94.92%)
Mutual labels:  security-tools
Erodir
A fast web directory/file enumeration tool written in Rust
Stars: ✭ 94 (-93.07%)
Mutual labels:  pentest-tool
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-93.66%)
Mutual labels:  pentest-tool
Findsploit
Find exploits in local and online databases instantly
Stars: ✭ 1,160 (-14.52%)
Mutual labels:  bugbounty
61-120 of 880 similar projects