☆197Apr 23, 2025Updated 11 months ago
Alternatives and similar repositories for Scopify
Users that are interested in Scopify are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆92Jun 17, 2025Updated 9 months ago
- ☆777May 7, 2025Updated 11 months ago
- ☆248Mar 13, 2025Updated last year
- A simple Bash script to discover all domains associated with a specific Microsoft 365 tenant - new replacement for check_mdi☆47Sep 23, 2025Updated 6 months ago
- A simple POC to expose Mythic as a MCP server☆73Mar 20, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Scripts that automate portions of pentests.☆58Mar 18, 2026Updated 3 weeks ago
- AI-powered ffuf wrapper☆711Dec 4, 2025Updated 4 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆104Apr 11, 2025Updated last year
- ☆17Oct 15, 2024Updated last year
- Verizon Burp Extensions: AI Suite☆142Apr 22, 2025Updated 11 months ago
- ☆107Jul 17, 2024Updated last year
- ☆17Jan 9, 2025Updated last year
- A simple browser extension to quickly find interesting security-related information on a webpage.☆175Mar 26, 2026Updated 2 weeks ago
- jxscout superpowers JavaScript analysis for security researchers☆448Feb 15, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- SpecOps is a Burp Suite extension that ingests an OpenAPI or Swagger spec and instantly builds a workbench to test every documented endpo…☆32Mar 27, 2026Updated 2 weeks ago
- Abuse trust-boundaries to bypass firewalls and network controls☆413Jul 24, 2025Updated 8 months ago
- ☆628Feb 5, 2026Updated 2 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆262Feb 21, 2025Updated last year
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆48Apr 7, 2025Updated last year
- Resolvalid is a fast, concurrent DNS server validator written in Go. Given a list of DNS servers, it tests each one and outputs only the …☆14Feb 26, 2026Updated last month
- Exploits Unauth Docker API☆43Apr 18, 2025Updated 11 months ago
- Docker container for running CobaltStrike 4.7 and above☆25Mar 20, 2025Updated last year
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆40Nov 20, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Azure Post Exploitation Framework☆246Oct 27, 2025Updated 5 months ago
- Cloud subdomains identification tool☆62Apr 15, 2025Updated 11 months ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆362Updated this week
- High-performance secrets scanner. CLI, Go library, Burp Suite extension, and Chrome extension. 487 detection rules with live credential v…☆501Updated this week
- CT Log Scanner☆531Dec 26, 2025Updated 3 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 9 months ago
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- Red Team Collaboration Infrastructure☆98Apr 24, 2025Updated 11 months ago
- Filesystem interaction via firebeam virtual machine execution☆49Mar 26, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆60Jun 2, 2025Updated 10 months ago
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆193Sep 19, 2025Updated 6 months ago
- Generate and Manage KeyCredentialLinks☆254Mar 9, 2026Updated last month
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Dec 2, 2024Updated last year
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆85Apr 2, 2025Updated last year
- ☆164Mar 20, 2026Updated 3 weeks ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆99Apr 2, 2025Updated last year