All Projects → Di.we.h → Similar Projects or Alternatives

811 Open source projects that are alternatives of or similar to Di.we.h

Bug-Hunting
A Collection of Notes, Methodologies, POCs and everything else related to Bug Hunting.
Stars: ✭ 110 (-29.49%)
Mutual labels:  bug-bounty, bugbounty
Grecon
Your Google Recon is Now Automated
Stars: ✭ 119 (-23.72%)
Mutual labels:  hacking, bugbounty
Hawkeye
Hawkeye filesystem analysis tool
Stars: ✭ 202 (+29.49%)
Mutual labels:  hacking, bug-bounty
Dumpall
一款信息泄漏利用工具,适用于.git/.svn源代码泄漏和.DS_Store泄漏
Stars: ✭ 250 (+60.26%)
Mutual labels:  hacking, bug-bounty
frida setup
One-click installer for Frida and Burp certs for SSL Pinning bypass
Stars: ✭ 47 (-69.87%)
Mutual labels:  bug-bounty, bugbounty
vaf
Vaf is a cross-platform very advanced and fast web fuzzer written in nim
Stars: ✭ 294 (+88.46%)
Mutual labels:  bug-bounty, bugbounty
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+173.72%)
Mutual labels:  hacking, bugbounty
Xspear
Powerfull XSS Scanning and Parameter analysis tool&gem
Stars: ✭ 583 (+273.72%)
Mutual labels:  hacking, bugbounty
Subjack
Subdomain Takeover tool written in Go
Stars: ✭ 1,194 (+665.38%)
Mutual labels:  bugbounty, bug-bounty
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+391.67%)
Mutual labels:  hacking, bugbounty
SQLi-Query-Tampering
SQLi Query Tampering extends and adds custom Payload Generator/Processor in Burp Suite's Intruder. This extension gives you the flexibility of manual testing with many powerful evasion techniques.
Stars: ✭ 123 (-21.15%)
Mutual labels:  bug-bounty, bugbounty
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-60.26%)
Mutual labels:  hacking, bugbounty
Gofingerprint
GoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fingerprints.
Stars: ✭ 120 (-23.08%)
Mutual labels:  hacking, bugbounty
Rfi Lfi Payload List
🎯 RFI/LFI Payload List
Stars: ✭ 202 (+29.49%)
Mutual labels:  bugbounty, bug-bounty
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+2104.49%)
Mutual labels:  bug-bounty, bugbounty
Asnlookup
Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (+4.49%)
Mutual labels:  hacking, bugbounty
Sql Injection Payload List
🎯 SQL Injection Payload List
Stars: ✭ 716 (+358.97%)
Mutual labels:  hacking, bugbounty
Awesome Vulnerable Apps
Awesome Vulnerable Applications
Stars: ✭ 180 (+15.38%)
Mutual labels:  hacking, bugbounty
Jwt Hack
🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)
Stars: ✭ 172 (+10.26%)
Mutual labels:  hacking, bugbounty
Spellbook
Micro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-66.03%)
Mutual labels:  hacking, bug-bounty
Cazador unr
Hacking tools
Stars: ✭ 95 (-39.1%)
Mutual labels:  hacking, bugbounty
Sub-Drill
A very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Stars: ✭ 70 (-55.13%)
Mutual labels:  bug-bounty, bugbounty
Sublert
Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (+348.08%)
Mutual labels:  hacking, bug-bounty
Jaeles
The Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+587.82%)
Mutual labels:  hacking, bugbounty
Webhackersweapons
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 1,205 (+672.44%)
Mutual labels:  hacking, bugbounty
Goaltdns
A permutation generation tool written in golang
Stars: ✭ 119 (-23.72%)
Mutual labels:  hacking, bug-bounty
Networm
Python network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-13.46%)
Mutual labels:  hacking
Shodan Dorks
Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (-24.36%)
Mutual labels:  hacking
N00brat
Remote Administration Toolkit (or Trojan) for POSiX (Linux/Unix) system working as a Web Service
Stars: ✭ 148 (-5.13%)
Mutual labels:  hacking
Openvehiclediag
A rust based cross-platform ECU diagnostics and car hacking application, utilizing the passthru protocol
Stars: ✭ 135 (-13.46%)
Mutual labels:  hacking
Sippts
Set of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-25.64%)
Mutual labels:  hacking
Oscp Automation
A collection of personal scripts used in hacking excercises.
Stars: ✭ 118 (-24.36%)
Mutual labels:  hacking
Huntr
Vulnerability Database | huntr.dev
Stars: ✭ 136 (-12.82%)
Mutual labels:  bug-bounty
Corsme
Cross Origin Resource Sharing MisConfiguration Scanner
Stars: ✭ 118 (-24.36%)
Mutual labels:  bugbounty
Awesome Cellular Hacking
Awesome-Cellular-Hacking
Stars: ✭ 1,827 (+1071.15%)
Mutual labels:  hacking
Ssti Payloads
🎯 Server Side Template Injection Payloads
Stars: ✭ 150 (-3.85%)
Mutual labels:  bugbounty
Proof Of Concepts
A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
Stars: ✭ 148 (-5.13%)
Mutual labels:  bugbounty
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+1069.23%)
Mutual labels:  hacking
Docker Vulnerable Dvwa
Damn Vulnerable Web Application Docker container
Stars: ✭ 117 (-25%)
Mutual labels:  hacking
Hackeronedb
The unofficial HackerOne disclosure Timeline
Stars: ✭ 117 (-25%)
Mutual labels:  bugbounty
Arduino Fastled Music Visualizer
An Arduino based music visualizer using the FastLED library and a strip of individually addressable LEDs
Stars: ✭ 134 (-14.1%)
Mutual labels:  hacking
Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-25.64%)
Mutual labels:  hacking
Instagramcracker
Full Speed Instagram Cracker
Stars: ✭ 147 (-5.77%)
Mutual labels:  hacking
Quickxss
Automating XSS using Bash
Stars: ✭ 113 (-27.56%)
Mutual labels:  bugbounty
Mitmap
📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+878.21%)
Mutual labels:  hacking
Gxss
A tool to check a bunch of URLs that contain reflecting params.
Stars: ✭ 115 (-26.28%)
Mutual labels:  bugbounty
Intelspy
Perform automated network reconnaissance scans
Stars: ✭ 134 (-14.1%)
Mutual labels:  hacking
Dns Discovery
DNS-Discovery is a multithreaded subdomain bruteforcer.
Stars: ✭ 114 (-26.92%)
Mutual labels:  bugbounty
Awesome Hacking
Awesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+1055.13%)
Mutual labels:  hacking
Apkleaks
Scanning APK file for URIs, endpoints & secrets.
Stars: ✭ 2,707 (+1635.26%)
Mutual labels:  bugbounty
Privilege Escalation
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Stars: ✭ 2,117 (+1257.05%)
Mutual labels:  hacking
Bug Hunting Colab
A Colab For Bug Hunting!
Stars: ✭ 147 (-5.77%)
Mutual labels:  bugbounty
Cr3dov3r
Know the dangers of credential reuse attacks.
Stars: ✭ 1,700 (+989.74%)
Mutual labels:  hacking
Burp Send To
Adds a customizable "Send to..."-context-menu to your BurpSuite.
Stars: ✭ 114 (-26.92%)
Mutual labels:  hacking
Linux Smart Enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
Stars: ✭ 1,956 (+1153.85%)
Mutual labels:  hacking
Dark Fantasy Hack Tool
DDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file system of websites.. Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities.) Web Spider: For gathering web application hacking information. Email scraper: To get all emails related to a webpage IMDB Rating: Easy way to access the movie database. Both .exe(compressed as zip) and .py versions are available in files.
Stars: ✭ 131 (-16.03%)
Mutual labels:  hacking
Brutemap
Let's find someone's account
Stars: ✭ 113 (-27.56%)
Mutual labels:  hacking
Bulwark
An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
Stars: ✭ 113 (-27.56%)
Mutual labels:  bugbounty
Dustcloud
Xiaomi Smart Home Device Reverse Engineering and Hacking
Stars: ✭ 1,907 (+1122.44%)
Mutual labels:  hacking
Blackphish
🔱 [ Phishing Made Easy ] 🔱 (In Beta)
Stars: ✭ 133 (-14.74%)
Mutual labels:  hacking
61-120 of 811 similar projects