WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.
☆22Apr 19, 2022Updated 4 years ago
Alternatives and similar repositories for WolverineFramework---DISCONTINUED
Users that are interested in WolverineFramework---DISCONTINUED are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 4 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆49Jul 18, 2024Updated last year
- Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merge…☆24Apr 20, 2022Updated 4 years ago
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆82Sep 15, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- A fast, powerful open-source password generator with hexagonal architecture. Features a zero-dependency core, Web UI demo, CLI tool, and …☆22Mar 26, 2026Updated last month
- mift - a mobile image forensic toolkit☆47Nov 14, 2023Updated 2 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- Perform OSINT on external targets using Shodan☆24Feb 7, 2024Updated 2 years ago
- A python approach to interacting with web shells.☆30Jan 16, 2021Updated 5 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆37May 23, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A script for automatize boolean-based blind SQL injections (MVP).☆54Aug 29, 2022Updated 3 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆23Jan 6, 2026Updated 3 months ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated 2 years ago
- ADDS (Active Directory Domain Services)☆28Mar 25, 2026Updated last month
- DirBruter is a Python based CLI tool. It looks for hidden or existing directories/files using brute force method. It basically works by l…☆17Nov 15, 2023Updated 2 years ago
- TIGMINT: OSINT (Open Source Intelligence) GUI software framework☆256Jul 29, 2021Updated 4 years ago
- Anvil Secure's Burp extension for signing AWS requests with SigV4☆21Aug 20, 2025Updated 8 months ago
- A proof-of-concept Node.js ransomware☆20Mar 27, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆23Aug 6, 2024Updated last year
- ☆17Jan 2, 2020Updated 6 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to prevent targeted passw…☆33Mar 4, 2023Updated 3 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆94Dec 7, 2025Updated 4 months ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated 2 months ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Apr 8, 2026Updated 3 weeks ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆93Jan 3, 2025Updated last year
- ☆12Sep 22, 2022Updated 3 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago