Simple Python script to sort nuclei scans by severity and URL
☆29May 24, 2023Updated 2 years ago
Alternatives and similar repositories for nuclei-scan-sort
Users that are interested in nuclei-scan-sort are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆22Feb 12, 2023Updated 3 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- A command line tool to interact with Microsoft Graph API☆23May 27, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆52Dec 8, 2022Updated 3 years ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆379Dec 5, 2023Updated 2 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆43Jul 18, 2024Updated last year
- Custom Binary Ninja Themes☆12Nov 11, 2023Updated 2 years ago
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 4 years ago
- A tool to extract all the urls and paths found in the content of a page (js sources included)☆22Aug 8, 2025Updated 8 months ago
- Scripts that automate portions of pentests.☆58Mar 18, 2026Updated 3 weeks ago
- Tool to manage user privileges☆31Sep 4, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆238Sep 3, 2023Updated 2 years ago
- Burp Suite extension for parsing Swagger web service definition files☆19Jul 15, 2025Updated 9 months ago
- Find sensitive information using dorks from different search-engines.☆93Oct 24, 2024Updated last year
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- ☆12Jun 15, 2022Updated 3 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 8 months ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- 瞎测,主要针对iot设备,路由器、网关、防火墙的常规命令执行、溢出测试☆27Apr 19, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- XSSearch is a comprehensive reflected XSS tool built on selenium framework in python language. It contains more than 3000 payloads for au…☆59Feb 4, 2022Updated 4 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆33Nov 12, 2022Updated 3 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Nov 21, 2022Updated 3 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆89Nov 5, 2023Updated 2 years ago
- A Python POC for CRED1 over SOCKS5☆166Oct 5, 2024Updated last year
- I will share my bug bounty tips here☆32Mar 6, 2023Updated 3 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Secretsdump C# version only supporting local (live) operation☆55Apr 20, 2025Updated 11 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Jul 29, 2022Updated 3 years ago
- Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604)☆17Aug 2, 2024Updated last year
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Your subdomains are free for the taking - no API key, no mistaking! 🕺☆37Feb 27, 2023Updated 3 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- SSH & FTP brute-forcing tool written in python☆11Oct 2, 2024Updated last year
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust☆59Mar 7, 2026Updated last month