☆237Jun 24, 2024Updated last year
Alternatives and similar repositories for pentest-muse-cli
Users that are interested in pentest-muse-cli are comparing it to the libraries listed below
Sorting:
- NoBlindi is a command-line tool for exploiting blind NoSQL injection vulnerabilities to recover passwords in web applications.☆28Nov 12, 2023Updated 2 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Security testing tool for analyzing HTTP 403 responses and identifying access control misconfigurations in web applications.☆173Jan 6, 2026Updated 2 months ago
- ☆74Apr 8, 2024Updated last year
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 20, 2026Updated 2 weeks ago
- Web Path Finder☆60Nov 22, 2023Updated 2 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆131Jun 1, 2024Updated last year
- hauditor is a tool designed to analyze the security headers returned by a web page.☆176Jul 6, 2024Updated last year
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆207Jan 12, 2025Updated last year
- NetworkAssessment: Network Compromise Assessment Tool☆94May 31, 2024Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆129Dec 23, 2025Updated 2 months ago
- Impacket☆49Feb 25, 2026Updated last week
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 3 months ago
- Postfix SMTP Smuggling - Expect Script POC☆23Dec 26, 2023Updated 2 years ago
- Web Security Scanner☆384Nov 13, 2025Updated 3 months ago
- A WLAN red team framework.☆156Feb 9, 2026Updated 3 weeks ago
- bypassing the twitter safety link firewall :)☆12May 4, 2025Updated 10 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆229Feb 25, 2026Updated last week
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 2 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆59Apr 16, 2024Updated last year
- Docker Remote API Scanner and Exploit☆180Nov 13, 2023Updated 2 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated 2 weeks ago
- Modular Buffer Overflow Fuzzer and Exploitation Tool☆10Aug 28, 2019Updated 6 years ago
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆144May 17, 2024Updated last year
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆142Jun 7, 2025Updated 9 months ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- A fast and comprehensive tool for organizational network scanning☆134Apr 15, 2024Updated last year