nikto
reconftw
nikto | reconftw | |
---|---|---|
9 | 3 | |
7,907 | 5,242 | |
- | - | |
7.8 | 9.2 | |
5 days ago | 13 days ago | |
Perl | Shell | |
GNU General Public License v3.0 or later | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
nikto
- A useful tool for developers to find vulnerabilities or errors on a website
-
Hacking from anywhere
1-) Learn Hacking on a debian based distro like Kali Linux - I personally started with tools like nikto, camhacker... and then moved to more complex frameworks like metasploit.
-
[GitHub Action]: Wrappers for sqlmap, bbot and nikto
Its not that much of a tool than wrappers of few awesome tools that most of you probably know and use today - sqlmap, bbot and nikto.
-
[GitHub Action][Release]: Add DAST and OSINT to your security pipelines
I'm excited to share with you my latest contributions to the GitHub community: a collection of free GitHub Actions designed to streamline and enhance security practices utilizing DAST and OSINT tooling that is widely used - sqlmap, bbot and nikto. There were no GH Actions that I could find, so I made them for my use case, but figured everyone can benefit from those awesome tools.
-
DB Vulnerabilitati API calls
Cred ca aici este fix ceea ce intrebi: https://github.com/sullo/nikto/tree/master/program/databases
-
Cheat sheet Nikto
Nikto is a phenomenal web server scanner that eases enumeration significantly. It's free and open-source.
- Nikto - web server scanner
-
Paranoid about publicly launching project
https://github.com/sullo/nikto running a tool like that to check for common vulnerabilities
reconftw
- Automated recognition frameworks?
-
I made a CLI that streamlines Ethical Hacking workflow
Checkout ReconFTW
-
Tools for subdomain brute forcing
reconFTW = https://github.com/six2dez/reconftw
What are some alternatives?
SQLMap - Automatic SQL injection and database takeover tool
LazyRecon - An automated approach to performing recon for bug bounty hunting and penetration testing.
bbot - A recursive internet scanner for hackers.
Sn1per - Attack Surface Management Platform
metasploitable3 - Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.
Resources-for-Beginner-Bug-Bounty-Hunters - A list of resources for those interested in getting started in bug bounties
Metasploit - Metasploit Framework
Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed - This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only.
Goohak - Automatically Launch Google Hacking Queries Against A Target Domain
ReconPi - ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.
hackerone-reports - Top disclosed reports from HackerOne
BugBountyScanner - A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.