☆197Apr 23, 2025Updated 10 months ago
Alternatives and similar repositories for Scopify
Users that are interested in Scopify are comparing it to the libraries listed below
Sorting:
- ☆772May 7, 2025Updated 9 months ago
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆91Jun 17, 2025Updated 8 months ago
- Scripts that automate portions of pentests.☆57Feb 13, 2026Updated 2 weeks ago
- ☆244Mar 13, 2025Updated 11 months ago
- AI-powered ffuf wrapper☆646Dec 4, 2025Updated 2 months ago
- A simple Bash script to discover all domains associated with a specific Microsoft 365 tenant - new replacement for check_mdi☆40Sep 23, 2025Updated 5 months ago
- A simple POC to expose Mythic as a MCP server☆73Mar 20, 2025Updated 11 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Apr 11, 2025Updated 10 months ago
- ☆49Feb 6, 2026Updated 3 weeks ago
- ☆17Jan 9, 2025Updated last year
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆262Feb 21, 2025Updated last year
- ☆58Jun 2, 2025Updated 9 months ago
- Exploits Unauth Docker API☆43Apr 18, 2025Updated 10 months ago
- Verizon Burp Extensions: AI Suite☆142Apr 22, 2025Updated 10 months ago
- ☆620Feb 5, 2026Updated 3 weeks ago
- Docker container for running CobaltStrike 4.7 and above☆24Mar 20, 2025Updated 11 months ago
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆81Apr 2, 2025Updated 11 months ago
- ☆107Jul 17, 2024Updated last year
- ☆17Oct 15, 2024Updated last year
- Cloud subdomains identification tool☆62Apr 15, 2025Updated 10 months ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆42Apr 7, 2025Updated 10 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆390Jul 24, 2025Updated 7 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Dec 7, 2024Updated last year
- A Python POC for CRED1 over SOCKS5☆164Oct 5, 2024Updated last year
- Generate and Manage KeyCredentialLinks☆248Jan 30, 2026Updated last month
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆167Nov 17, 2025Updated 3 months ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆383Nov 26, 2024Updated last year
- A simple browser extension to quickly find interesting security-related information on a webpage.☆170Jan 20, 2026Updated last month
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆188Sep 19, 2025Updated 5 months ago
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆40Nov 20, 2025Updated 3 months ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆1,033Dec 31, 2025Updated 2 months ago
- jxscout superpowers JavaScript analysis for security researchers☆391Feb 15, 2026Updated 2 weeks ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆309Feb 16, 2026Updated 2 weeks ago
- Claude MCP server to perform analysis on ROADrecon data☆48Mar 30, 2025Updated 11 months ago
- Results from analyzing data gathered from 1.6 billion subdomains☆32Oct 15, 2024Updated last year
- AI/LLM local model integration for analysis of reconftw results☆93May 3, 2025Updated 10 months ago
- CT Log Scanner☆517Dec 26, 2025Updated 2 months ago
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning-On Your Terms. Easily distribute arbit…☆724Dec 26, 2025Updated 2 months ago