A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
☆574Dec 9, 2017Updated 8 years ago
Alternatives and similar repositories for yasuo
Users that are interested in yasuo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- ☆90Aug 29, 2025Updated 7 months ago
- Specify targets and run sets of tools against them☆387Apr 23, 2019Updated 6 years ago
- application server attack toolkit☆687Apr 6, 2020Updated 5 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Jun 14, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- Extract Sense out of Gibberish stuff☆81May 11, 2017Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆497Sep 21, 2021Updated 4 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆352Jan 12, 2023Updated 3 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆195Jun 23, 2019Updated 6 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- ☆11Apr 28, 2017Updated 8 years ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,044Nov 24, 2019Updated 6 years ago
- WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr …☆491Oct 3, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆278Feb 12, 2021Updated 5 years ago
- Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite☆322Aug 20, 2017Updated 8 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆261Aug 6, 2016Updated 9 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- Advanced Web Shell☆580May 1, 2017Updated 8 years ago
- ☆424Aug 29, 2017Updated 8 years ago
- Post Exploitation Collection☆1,572May 1, 2020Updated 5 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆986Dec 13, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,452Nov 20, 2025Updated 4 months ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,242Nov 20, 2025Updated 4 months ago
- Automates some pentest jobs via nmap xml file☆325Sep 7, 2018Updated 7 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- WebApp Information Gatherer☆550May 29, 2018Updated 7 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Mar 6, 2019Updated 7 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Mar 26, 2019Updated 7 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆301Jun 25, 2015Updated 10 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- A Python Framework For NoSQL Scanning and Exploitation☆602Dec 6, 2024Updated last year
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- wide range mass audit toolkit☆1,034Oct 3, 2018Updated 7 years ago