Advanced dork Search & Mass Exploit Scanner
☆1,551Aug 10, 2024Updated last year
Alternatives and similar repositories for ATSCAN
Users that are interested in ATSCAN are comparing it to the libraries listed below
Sorting:
- Cross-site scripting labs for web application security enthusiasts☆331Jun 2, 2021Updated 4 years ago
- SQL injection challenge☆109Jan 19, 2017Updated 9 years ago
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns☆1,560Nov 14, 2023Updated 2 years ago
- Repository to index useful online tools for CTF☆173Feb 2, 2025Updated last year
- Find exploits in local and online databases instantly☆1,809Sep 27, 2021Updated 4 years ago
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,713Oct 8, 2023Updated 2 years ago
- Challenge source code, handout scripts and writeups of BSides Delhi CTF☆76Oct 15, 2019Updated 6 years ago
- Python-based tool to dump security information from Windows systems☆280Jun 22, 2020Updated 5 years ago
- swiss army knife for hackers☆543Jul 18, 2023Updated 2 years ago
- CTF Challenges☆139Dec 17, 2024Updated last year
- Advanced reconnaissance utility☆994Nov 20, 2023Updated 2 years ago
- Attack Surface Management Platform☆9,418Feb 15, 2026Updated 2 weeks ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,042Nov 24, 2019Updated 6 years ago
- Command-line tool to scan Google search results for vulnerabilities☆544Feb 5, 2026Updated 3 weeks ago
- for mass exploiting☆614Jul 14, 2022Updated 3 years ago
- This is a list of security tools that I have used or recommend. Welcome any contributions!☆382Feb 6, 2024Updated 2 years ago
- Phishing Campaign Toolkit☆2,508Jul 29, 2025Updated 7 months ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,446May 6, 2024Updated last year
- Automatically brute force all services running on a target.☆2,222Aug 18, 2024Updated last year
- Automated All-in-One OS Command Injection Exploitation Tool☆5,640Feb 22, 2026Updated last week
- Reconnaissance Swiss Army Knife☆2,009Jan 26, 2021Updated 5 years ago
- Striker is an offensive information and vulnerability scanner.☆2,317Jun 4, 2023Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,437Nov 3, 2018Updated 7 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,439Oct 3, 2025Updated 4 months ago
- Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom valid…☆882Apr 9, 2021Updated 4 years ago
- Challenge source code, handout script and writeups of InCTF National Edition☆95Oct 2, 2019Updated 6 years ago
- A Modern Orchestration Engine for Security☆6,109Feb 19, 2026Updated last week
- vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It …☆2,074Jun 7, 2023Updated 2 years ago
- Write-ups and Source-codes for CTF Challenges☆70Oct 29, 2024Updated last year
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,321Jan 23, 2018Updated 8 years ago
- List of Awesome Red Teaming Resources☆7,788Dec 28, 2023Updated 2 years ago
- Challenges source code☆66Jan 27, 2018Updated 8 years ago
- Source code files and writeups of the 2018 CFI CTF's challenges.☆51Dec 12, 2018Updated 7 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,043Mar 17, 2024Updated last year
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆2,245Jun 10, 2025Updated 8 months ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,780Nov 24, 2024Updated last year
- massive SQL injection vulnerability scanner☆1,229Aug 14, 2018Updated 7 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆770Apr 5, 2020Updated 5 years ago
- The Multi-Tool Web Vulnerability Scanner.☆1,976Aug 22, 2023Updated 2 years ago