Ashwesker / Blackash-CVE-2025-61884Links
CVE-2025-61884
☆24Updated last month
Alternatives and similar repositories for Blackash-CVE-2025-61884
Users that are interested in Blackash-CVE-2025-61884 are comparing it to the libraries listed below
Sorting:
- Source of swisskyrepo.github.io - Public☆26Updated 5 months ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆100Updated last month
- Just a better dirbuster☆13Updated 3 years ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆17Updated 3 years ago
- HackersPlayground—a curated collection of cybersecurity resources, tools, and methodologies for penetration testers.☆24Updated 2 weeks ago
- VM Lab for security☆10Updated last year
- A tool designed for penetration testers to perform attacks on LAN and WLAN networks, including network discovery, exploitation, and NAC b…☆43Updated 4 months ago
- Offensive Security Python. Collection of python scripts that I created/pirated/curated to help me understand CyberSecurity. I find it hel…☆52Updated 5 months ago
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆40Updated 2 years ago
- Magicspoofing it's a python script that checks & test SPF/DMARC DNS records an tries to spoof a domain with a open relay mail system.☆53Updated 9 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆51Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your car…☆33Updated last month
- This tool uses the GitHub API to scan repositories owned by a user for email addresses and associated names. It provides options to scan …☆46Updated 5 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
- Multithread reverse shell listener☆26Updated last year
- Python3 script to dump breach data from Dehashed☆38Updated 5 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Updated last year
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆57Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆112Updated 3 months ago
- APK Infrastructure Investigator☆65Updated 2 years ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆35Updated 5 months ago
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆43Updated 7 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆45Updated last year
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Updated 2 years ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆44Updated 6 months ago
- Social Engineering Browser Update Attack.☆59Updated 2 years ago