This toolkit consists of multiple Python scripts designed for security testing, reconnaissance, and vulnerability assessment.
- Tests API endpoints for security vulnerabilities.
- Supports GET and POST requests with customizable headers.
- Identifies API endpoints from a given website.
- Uses web scraping and wordlist-based enumeration.
- Retrieves the IP address of a given domain.
- Performs WHOIS lookup and reverse DNS queries.
- Scans HTTP headers for security misconfigurations.
- Identifies missing or weak security headers.
- Automates script-based penetration testing tasks.
- Can be customized for exploitation scenarios.
- Extracts URLs from a given web page or document.
- Useful for phishing analysis and OSINT investigations.
- Simulates buffer overflow attacks for vulnerability research.
- Helps identify memory corruption issues in applications.
- Ensure Python 3.x is installed.
- Install required dependencies:
pip install <library names> [libraries you needed to run the code]
-In terminal use the command:
python example.py [replace the example.py with the file name]These scripts are intended for educational and ethical hacking purposes only. The author is not responsible for any misuse of these tools.
Aditya Barokar – Security Analyst & Penetration Tester
