metabigor
MobileHackersWeapons
metabigor | MobileHackersWeapons | |
---|---|---|
1 | 1 | |
1,141 | 641 | |
- | - | |
6.4 | 4.9 | |
14 days ago | 14 days ago | |
Go | Go | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
metabigor
MobileHackersWeapons
What are some alternatives?
uncover - Quickly discover exposed hosts on the internet using multiple search engines.
goblob - A fast enumeration tool for publicly exposed Azure Storage blobs.
gitlab-subdomains - Find subdomains on GitLab.
jaeles - The Swiss Army knife for automated Web Application Testing
scan4all - Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
dirsearch - Web path scanner
asnip - ASN target organization IP range attack surface mapping for reconnaissance, fast and lightweight
WebHackersWeapons - ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
BucketLoot - BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for custom keywords as well as Regular Expressions from publicly-exposed storage buckets by scanning files that store data in plain-text.
ham - HAM (Hetzner Android Make) is a simple tool written in GO which can build LineageOS (or AOSP) from source using Hetzner Cloud, Fully Automated. Build under €1.
udon - A simple tool that helps to find assets/domains based on the Google Analytics ID.
PassDetective - PassDetective is a command-line tool that scans shell command history to detect mistakenly written passwords, API keys, and secrets. Using regular expressions, it helps prevent accidental exposure of sensitive information in your command history.