Gathers detailed local system and network information, providing comprehensive insights into hardware, software, network configurations, and more.
-
Updated
Sep 30, 2024 - Shell
Gathers detailed local system and network information, providing comprehensive insights into hardware, software, network configurations, and more.
Bug Bounty Vps Setup Tools
CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based tools to gather information and identify the attack surface, making it a valuable asset for bug bounty hunters and penetration testers.
A collection of bash scripts to enumerate / bruteforce various services using tools often available in popular distros
Automate Scoping, OSINT and Recon assessments.
It automatically checks sudo rules for every found user on each system through ssh login
An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.
An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.
Incursore came from nmapAutomator to be your personal raider while you enumerate a target.
linWinPwn is a bash script that streamlines the use of a number of Active Directory tools
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Simple ADB toolkit to penetrate Android device using Android Debug Bridge with over 35 features.
NetAuto is a customizable network reconnaissance tool for enumerating services, protocols and ports.
DirAuto is a customizable directory reconnaissance tool for automating enumeration of subdomains for network scanning.
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
External attack surface discovery, enumeration and reconnaissance for massive networks
💥 This tool is intended for bounty hunters, the script installs and launches the best set of tools for expanding the attack surface, for Web Sites, portals, and Organizations.
Automation for Open Threat Exchange
Add a description, image, and links to the enumeration topic page so that developers can more easily learn about it.
To associate your repository with the enumeration topic, visit your repo's landing page and select "manage topics."