Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Pentest Tools | 2,652 | a year ago | 1 | Python | ||||||
A collection of custom security tools for quick needs. | ||||||||||
Awesome Bugbounty Tools | 2,580 | a year ago | 2 | cc0-1.0 | ||||||
A curated list of various bug bounty tools | ||||||||||
Information_collection_handbook | 694 | a year ago | ||||||||
Handbook of information collection for penetration testing and src | ||||||||||
Hackbox | 366 | a year ago | gpl-3.0 | Python | ||||||
HackBox is a powerful and comprehensive tool that combines a variety of techniques for web application and network security assessments, including XSS testing, subdomain scanning, SSRF injection, and more. Its user-friendly interface and wide range of features make it a valuable asset for security professionals. | ||||||||||
Unimap | 365 | 9 months ago | 2 | September 04, 2020 | 2 | gpl-3.0 | Rust | |||
Scan only once by IP address and reduce scan times with Nmap for large amounts of data. | ||||||||||
Celerystalk | 294 | 4 years ago | 24 | mit | Python | |||||
An asynchronous enumeration & vulnerability scanner. Run all the tools on all the hosts. | ||||||||||
Magicrecon | 240 | 3 years ago | gpl-3.0 | Shell | ||||||
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats. | ||||||||||
Automated Scanner | 208 | 3 years ago | 5 | Shell | ||||||
Trying to make automated recon for bug bounties | ||||||||||
Lazyrecon | 169 | 4 years ago | 8 | mit | Shell | |||||
An automated approach to performing recon for bug bounty hunting and penetration testing. | ||||||||||
Dr_robot | 125 | 3 years ago | 10 | other | Python | |||||
This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Intelligence) tools. |