PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.
β70Apr 8, 2026Updated last week
Alternatives and similar repositories for pwn
Users that are interested in pwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fast and easy to use CLI-based file encryption program π¦β13Oct 12, 2025Updated 6 months ago
- Web Server Vulnerability Scanning Toolβ36Mar 11, 2025Updated last year
- BlueSky OSINT Toolβ14Dec 10, 2024Updated last year
- β155Dec 19, 2024Updated last year
- Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchersβ102Apr 8, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Identify hardcoded secrets in static structured text (version 2)β99Feb 5, 2025Updated last year
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.β36Jan 4, 2026Updated 3 months ago
- Multilingual library made for validation, various form fields, such as: email, telephone, password, cpf, cnpj, credit card, magic numbersβ¦β19Feb 15, 2025Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.β124Dec 13, 2025Updated 4 months ago
- Scripts and Lambdas to help with automated deployment of AWS Shield Advancedβ12Feb 11, 2022Updated 4 years ago
- πΉ Python project to bruteforce Apache Tomcat manager login with known-default credentialsβ99Mar 12, 2024Updated 2 years ago
- one-stop resource for all things offensive security.β179Feb 21, 2026Updated last month
- A Powerful Network Reconnaissance Tool for Security Professionalsβ107Dec 29, 2024Updated last year
- Modular web-application honeypot platform built using go and ginβ63May 8, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many portsβ61Jul 13, 2025Updated 9 months ago
- π EclipseRecon is a personal project developed during my cybersecurity learning journey π‘οΈ. It helps practice web reconnaissance π by β¦β29Nov 26, 2025Updated 4 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrencyβ15Apr 8, 2026Updated last week
- PromptMe is an educational project that showcases security vulnerabilities in large language models (LLMs) and their web integrations. Itβ¦β97Jun 29, 2025Updated 9 months ago
- π‘ 802.11 broadcast analyzer & injectorβ174Jun 17, 2025Updated 9 months ago
- A tool to audit Erlang & Elixir dependencies, to make sure your β¨ gleam projects really sparkle!β24Apr 4, 2026Updated last week
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registrationβ309Updated this week
- Red Kite, the Extensible Attack Surface Management tool.β90Feb 8, 2026Updated 2 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs andβ¦β163Nov 21, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- seCureLI is a tool that enables you to experience the delight of building products by helping you get ideas from your head into working sβ¦β28Jul 15, 2024Updated last year
- An index of publicly available and open-source threat detection rulesets.β130Apr 17, 2025Updated 11 months ago
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probesβ15Aug 4, 2022Updated 3 years ago
- Store and retrieve encrypted secrets with PowerShell on Windows, Linux, or MacOS and also from KeePass 2 databases on Windowsβ34Mar 4, 2026Updated last month
- A repository teaching bss/data segment exploitation techniques.β13Aug 11, 2019Updated 6 years ago
- Run the AWS CLI, with the ability to run under an assumed role, to access resources and properties missing from the Terraform AWS Provideβ¦β33Apr 2, 2026Updated 2 weeks ago
- An uber fast and simple subdomain enumeration tool using DNS and web requests with support for detecting wildcard DNS records.β172May 5, 2024Updated last year
- eBPF Memory Dump Toolβ103Apr 8, 2026Updated last week
- Customized CVE FEED Notifierβ112Apr 22, 2025Updated 11 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI β’ AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offerβ¦β373Apr 6, 2024Updated 2 years ago
- Tool for obfuscating and deobfuscating data.β77Mar 20, 2024Updated 2 years ago
- Reverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.β129Updated this week
- An IAM Simulator that outputs detailed explains of how a request was evaluated.β100Updated this week
- Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.β246Updated this week
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network cβ¦β43Mar 31, 2026Updated 2 weeks ago
- Post-Exploitation module for Penetration Tester and Hackers.β27Dec 29, 2021Updated 4 years ago