webstor
SpiderSuite
webstor | SpiderSuite | |
---|---|---|
5 | 8 | |
150 | 543 | |
- | - | |
2.8 | 6.1 | |
about 2 months ago | 8 months ago | |
Python | ||
MIT License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
webstor
- Show HN: WebStor – Enumerate all your web technologies and find zero-days fast
- GitHub - RossGeerlings/webstor: A script to quickly enumerate all websites across all of your organization's networks, store their responses, and query for known web technologies, such as those with zero-day vulnerabilities.
- WebStor, a script to quickly enumerate all websites across all of your organization's networks, store their responses, and query for known web technologies, such as those with zero-day vulnerabilities.
-
WebStor, a new open source utility to quickly ID web technologies across an organization's networks
You can check it out at GitHub at: https://github.com/RossGeerlings/webstor
SpiderSuite
- Show HN: SpiderSuite version 1.0.4. Whats new?
-
Show HN: SpiderSuite: Advance GUI web security crawler
I am planning to release the source very soon that is why i left the license file, but I'll remove it to avoid the confusion for now until I release the source.
For the user guides, those are the official user guides that come with the release packages. The online user guides can be found at https://github.com/3nock/SpiderSuite/wiki and https://spidersuite.github.io/docs/
-
Introducing SpiderSuite: Advance web security crawler
Official page: https://SpiderSuite.github.io/
I think perhaps there's some stale content in the contributing section, since it talks about "developers" fixing issues but there's no source code. Perhaps that part was just left over from a previous time because the actual CONTRIBUTING.md doesn't mention any source changes, which seems in alignment with the repo's contents
What are some alternatives?
CloudSniffer - CloudSniffer is a powerful tool designed to aid in the discovery of the real IP address of a website protected by Cloudflare. It leverages brute force techniques by testing a list of IP addresses and analyzing the status codes returned by the server to uncover the actual IP address of the target website.
BET365-API - The latest way to get bet365 data odds, with a delay of 0.2 seconds bet365api
OTE - OSINT Template Engine
rengine - reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with minimal configuration and with the help of reNgine's correlation, it just makes recon effortless.
csprecon - Discover new target domains using Content Security Policy
scilla - Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration
detectify-cves - Find CVEs that don't have a Detectify modules.
goey-master - Cross platform UI toolkit aggregator for Windows / Linux / Mac. GTK, Cocoa, Windows API
seclook - Automatic security lookups from your clipboard
google-search - Returns results from Google search.
swaggerHole - A python3 script searching for secret on swaggerhub