dirsearch
hacktricks
Our great sponsors
dirsearch | hacktricks | |
---|---|---|
12 | 6 | |
11,253 | 8,197 | |
- | 4.3% | |
7.7 | 9.8 | |
30 days ago | 2 days ago | |
Python | Python | |
- | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
dirsearch
-
Looking for some help with this Python package
I am new to Python. With the help of several users (thanks u/Diapolo10 and u/shiftybyte)I've been able to install Python and the dirsearch package. Dirsearch (https://github.com/maurosoria/dirsearch) allows for checking website paths with a wordlist. For example, I have a wordlist file with words like "dog", "cat", "bird", etc and I want to check the validity of those words as extensions on a website. Something like "example.com/bird", "example.com/cat", etc. I have a test wordlist in the same directory as dirsearch, but I am confused on how to proceed with the commands. I want to have it check my wordlist as extensions on the example.com website and then save output on if the webpath is valid or not. Just need a little bit of help.
-
The 36 tools that SaaS can use to keep their product and data safe from criminal hackers (manual research)
DirSearch
-
Pentesting Tools I Use Everyday
Learn more about dirsearch here: https://github.com/maurosoria/dirsearch
-
Mapping your AWS attack surface
Empowered with a list of all the exposed URLs in your organization, you can then set up a process to scan these using a number of web-focused Dynamic Application Security Testing (DAST) tools and scanners such as Zed Attack Proxy, dirsearch (Web path scanner), Aquatone, and Nikto2. The OWASP® Foundation maintains a full list of scanning tools that could be used.
-
Millions of .git folders exposed publicly by mistake
Scan our domains and infrastructure to reveal if we have exposed.git repositories and other critical infrastructure. You can scan your domains and subdomains with many tools such as Amass or dirsearch to name a couple.
- dirsearch - release v0.4.3 - crawling supported
- Release dirsearch v0.4.2 - Web Path Scanner
- recommended tools that do not come with Kali
- How to choose a web path scanner? [closed]
-
Tools and Skills to be the Bug Bounty Hunting.
dirsearch:
hacktricks
- Where do you look for help when doing ctf
-
Desktop background changed suddenly
Honestly when I saw desktopimgdownldr.exe I thought LOLBAS as well. https://github.com/carlospolop/hacktricks/blob/master/windows-hardening/basic-cmd-for-pentesters.md
- Best way to learn advanced DOM XSS.
-
Trying to find a username and password to access a virtual machine to solve a CTF?
shot in the dark.... but the port 135 being open might be interesting?
- An Effective Pentesting Methodology
- Comprehensive Guide to Pen-Testing
What are some alternatives?
gobuster - Directory/File, DNS and VHost busting tool written in Go
Lockdoor-Framework - 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Bitcoin-wallet-cracker - Automated Bitcoin wallet generator that with mnemonic and passphrases bruteforces wallet addresses
evillimiter - Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
CheatSheetSeries - The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Ciphey - ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
asleep_scanner - Dahua DVRs bruteforcer at port 37777
DumpsterFire - "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
IPRotate_Burp_Extension - Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.
owasp-mastg - The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
stegseek - :zap: Worlds fastest steghide cracker, chewing through millions of passwords per second :zap:
xss-demo - Simple flask website to demonstrate reflected and stored XSS attacks.