CATANA - CUT your Wordlist!
☆16Oct 2, 2022Updated 3 years ago
Alternatives and similar repositories for catana
Users that are interested in catana are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A custom script I created because I got tired of installing my tools manually!☆13Nov 19, 2024Updated last year
- Tool for CVE-2022-1388☆14May 13, 2022Updated 3 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Enhanced Stealth Tunnel for Linux (Red Team Ops on compromised machine with root)☆14Jun 10, 2025Updated 10 months ago
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.☆14Jan 28, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Basic script to rotate through reverse SSH proxies built through EC2, useful for obfuscating (weakly anonymizing) your source. Nice for b…☆13Mar 6, 2015Updated 11 years ago
- Python3 HTTP Server with upload functionality☆21Dec 4, 2023Updated 2 years ago
- Trojan (Ransomware) Phishing Simulator for Cybersecurity Training.☆37Nov 6, 2025Updated 5 months ago
- This project is an interactive and responsive dashboard designed with HTML and CSS. It features a sleek navigation bar 🔗, data cards to …☆12May 23, 2025Updated 11 months ago
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handling☆11Oct 25, 2023Updated 2 years ago
- ⚡️ Multiple target ZAP Scanning☆106Apr 17, 2026Updated last week
- x86_64 LKM linux rootkit☆16Jul 1, 2023Updated 2 years ago
- “Intelliroot Code Injection Hunter” is a tool that can to help you identify injected malicious code. The tool can identify and extract po…☆16Sep 21, 2022Updated 3 years ago
- Vector-Rat is a powerful remote access tool designed specifically for Windows. It allows seamless control and management of any device re…☆20Apr 6, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Sp00fer blog post -☆24Jul 19, 2022Updated 3 years ago
- 🎮 Guess the Number Game: A fun and interactive game where the computer picks a random number between 1 and 100. 🤔 Your mission? Guess t…☆32Oct 20, 2025Updated 6 months ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Jul 2, 2020Updated 5 years ago
- CloudFlare Ultimate WAF Bypass Tamper Script Comprehensive evasion techniques collection Research and educational purposes only by KL3FT3…☆58Nov 6, 2025Updated 5 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Tapir: a tool to search through NIST CVE database, with cache and regex.☆17Jan 20, 2023Updated 3 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.com☆107Aug 6, 2022Updated 3 years ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆25Apr 6, 2025Updated last year
- A curated GitHub repository that's in-scope and eligible for bounty.☆21Aug 10, 2022Updated 3 years ago
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet☆56Oct 23, 2024Updated last year
- Chrome extension that allows users to generate strong and secure passwords with just one click.☆30Feb 12, 2026Updated 2 months ago
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Single-threaded epoll-based concurrent bulk whois client☆31Oct 31, 2017Updated 8 years ago
- A python exploit to automatically dump all the data stored by the auto-completion plugin of Ametys CMS to a local sqlite database file.☆14May 3, 2022Updated 3 years ago
- An exploit for CVE-2018-5955 GitStack 2.3.10 Unauthenticated RCE☆10Nov 15, 2024Updated last year
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- Spot all domain controllers in a Microsoft Active Directory environment. Find computer name, FQDN, and IP address(es) of all DCs.☆20Jun 23, 2024Updated last year
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- Nuclei templates which I wrote myself☆10Jan 8, 2022Updated 4 years ago