All Projects → Dirsearch → Similar Projects or Alternatives

2323 Open source projects that are alternatives of or similar to Dirsearch

Dumpall
一款信息泄漏利用工具,适用于.git/.svn源代码泄漏和.DS_Store泄漏
Stars: ✭ 250 (-96.55%)
Mutual labels:  hacking, pentesting, scanner, bug-bounty
Docker Security Images
🔐 Docker Container for Penetration Testing & Security
Stars: ✭ 172 (-97.63%)
Jaeles
The Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (-85.19%)
Mutual labels:  hacking, scanner, infosec, bugbounty
Awesome Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
Stars: ✭ 48,038 (+562.96%)
Xxe Injection Payload List
🎯 XML External Entity (XXE) Injection Payload List
Stars: ✭ 304 (-95.8%)
Mutual labels:  hacking, infosec, bug-bounty, bugbounty
Quiver
Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-98.07%)
T14m4t
Automated brute-forcing attack tool.
Stars: ✭ 160 (-97.79%)
Asnlookup
Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-97.75%)
Mutual labels:  hacking, infosec, enumeration, bugbounty
Minesweeper
A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-97.76%)
Awesome Hacking Lists
平常看到好的渗透hacking工具和多领域效率工具的集合
Stars: ✭ 311 (-95.71%)
Mutual labels:  hacking, hacking-tool, bug-bounty, bugbounty
Sn1per
Attack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (-32.42%)
Awesome Shodan Queries
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩‍💻
Stars: ✭ 2,758 (-61.94%)
Offensive Docker
Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-95.47%)
Mutual labels:  hacking, pentesting, bug-bounty, bugbounty
Enumdb
Relational database brute force and post exploitation tool for MySQL and MSSQL
Stars: ✭ 167 (-97.7%)
Oscp Automation
A collection of personal scripts used in hacking excercises.
Stars: ✭ 118 (-98.37%)
Dictionary Of Pentesting
Dictionary collection project such as Pentesing, Fuzzing, Bruteforce and BugBounty. 渗透测试、SRC漏洞挖掘、爆破、Fuzzing等字典收集项目。
Stars: ✭ 492 (-93.21%)
Mutual labels:  pentesting, bruteforce, fuzzing, bugbounty
Hawkeye
Hawkeye filesystem analysis tool
Stars: ✭ 202 (-97.21%)
Mutual labels:  hacking, pentesting, infosec, bug-bounty
Icg Autoexploiterbot
Wordpress 🔥 Joomla 🔥 Drupal 🔥 OsCommerce 🔥 Prestashop 🔥 Opencart 🔥
Stars: ✭ 242 (-96.66%)
Mercury
Mercury is a hacking tool used to collect information and use the information to further hurt the target
Stars: ✭ 236 (-96.74%)
Mutual labels:  hacking, bruteforce, wordlist
fuzzmost
all manner of wordlists
Stars: ✭ 23 (-99.68%)
Mutual labels:  wordlist, infosec, bugbounty
h1-search
Tool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.
Stars: ✭ 58 (-99.2%)
Mutual labels:  infosec, bugbounty, pentest-tool
credcheck
Credentials Checking Framework
Stars: ✭ 50 (-99.31%)
Mutual labels:  bug-bounty, bugbounty, pentest-tool
Security whitepapers
Collection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQLi
Stars: ✭ 644 (-91.11%)
Mutual labels:  hacking, pentesting, bugbounty
fleex
Fleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.
Stars: ✭ 181 (-97.5%)
Mutual labels:  bug-bounty, bugbounty, hacking-tool
Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 1,572 (-78.31%)
Mutual labels:  scanner, enumeration, bugbounty
ras-fuzzer
RAS(RAndom Subdomain) Fuzzer
Stars: ✭ 42 (-99.42%)
Mutual labels:  fuzzing, bugbounty, fuzzer
Phonia
Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any international phone numbers with a very good accuracy.
Stars: ✭ 221 (-96.95%)
Mutual labels:  hacking, scanner, hacking-tool
Badkarma
network reconnaissance toolkit
Stars: ✭ 353 (-95.13%)
K8tools
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Stars: ✭ 4,173 (-42.41%)
Mutual labels:  hacking, scanner, brute-force
Aiodnsbrute
Python 3.5+ DNS asynchronous brute force utility
Stars: ✭ 370 (-94.89%)
Mutual labels:  pentesting, brute-force, enumeration
PyParser-CVE
Multi source CVE/exploit parser.
Stars: ✭ 25 (-99.65%)
Nishang
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: ✭ 5,943 (-17.98%)
Mutual labels:  hacking, penetration-testing, infosec
SourceWolf
Amazingly fast response crawler to find juicy stuff in the source code! 😎🔥
Stars: ✭ 132 (-98.18%)
Mutual labels:  wordlist, fuzzing, bugbounty
flydns
Related subdomains finder
Stars: ✭ 29 (-99.6%)
Mutual labels:  bug-bounty, infosec, bugbounty
Subover
A Powerful Subdomain Takeover Tool
Stars: ✭ 607 (-91.62%)
Mutual labels:  pentesting, bug-bounty, bugbounty
Blazy
Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .
Stars: ✭ 637 (-91.21%)
Mutual labels:  scanner, bruteforce, brute-force
boxer
Boxer: A fast directory bruteforce tool written in Python with concurrency.
Stars: ✭ 15 (-99.79%)
ronin-support
A support library for Ronin. Like activesupport, but for hacking!
Stars: ✭ 23 (-99.68%)
Mutual labels:  wordlist, fuzzing, infosec
Capsulecorp Pentest
Vagrant VirtualBox environment for conducting an internal network penetration test
Stars: ✭ 214 (-97.05%)
magicRecon
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (-93.4%)
Mutual labels:  scanner, infosec, bugbounty
urldedupe
Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
Stars: ✭ 208 (-97.13%)
Lucifer
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (-95.83%)
ggtfobins
Get GTFOBins info about a given exploit from the command line
Stars: ✭ 27 (-99.63%)
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-99.38%)
Securitymanageframwork
Security Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Stars: ✭ 378 (-94.78%)
Mutual labels:  pentesting, scanner, infosec
reconmap
Vulnerability assessment and penetration testing automation and reporting platform for teams.
Stars: ✭ 242 (-96.66%)
Reconky-Automated Bash Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (-97.7%)
ObsidianSailboat
Nmap and NSE command line wrapper in the style of Metasploit
Stars: ✭ 36 (-99.5%)
Mutual labels:  appsec, hacking-tool, pentest-tool
nozaki
HTTP fuzzer engine security oriented
Stars: ✭ 37 (-99.49%)
Mutual labels:  fuzzing, bugbounty, fuzzer
pentesting-dockerfiles
Pentesting/Bugbounty Dockerfiles.
Stars: ✭ 148 (-97.96%)
Mutual labels:  bugbounty, hacking-tool, pentest-tool
Stegcracker
Steganography brute-force utility to uncover hidden data inside files
Stars: ✭ 396 (-94.53%)
SimpleKeylogger
Simple Keylogger with smtp to send emails on your account using python works on linux and Windows
Stars: ✭ 32 (-99.56%)
Mutual labels:  infosec, pentesting, hacking-tool
Bigbountyrecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (-92.53%)
Mutual labels:  pentesting, bugbounty, pentest-tool
Red Teaming Toolkit
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Stars: ✭ 5,615 (-22.51%)
Mutual labels:  hacking, pentesting, infosec
sub404
A python tool to check subdomain takeover vulnerability
Stars: ✭ 205 (-97.17%)
Mutual labels:  bug-bounty, pentesting, bugbounty
Sifter
Sifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (-94.44%)
Archstrike
An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (-94.47%)
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (-98.96%)
leaky-paths
A collection of special paths linked to major web CVEs, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to scan passively for high-quality endpoints and quick-wins.
Stars: ✭ 507 (-93%)
Mutual labels:  fuzzing, bugbounty, dirsearch
JWTweak
Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.
Stars: ✭ 85 (-98.83%)
Mutual labels:  pentesting, bugbounty, appsec
61-120 of 2323 similar projects