☆12Mar 18, 2025Updated 11 months ago
Alternatives and similar repositories for Saka
Users that are interested in Saka are comparing it to the libraries listed below
Sorting:
- A comprehensive reconnaissance and vulnerability scanning tool that combines multiple security assessment capabilities into a single auto…☆26Jun 24, 2025Updated 8 months ago
- A simple pentest container equipped with common python pentest tools.☆42Jan 30, 2026Updated last month
- ☆11Feb 28, 2022Updated 4 years ago
- HOCig- Automatic HOC Information Gathering Tool V 1.2☆10May 4, 2021Updated 4 years ago
- Exploit for CVE-2018-7600.. called drupalgeddon2,☆11Apr 19, 2018Updated 7 years ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- ☆11Sep 1, 2022Updated 3 years ago
- SOC bilgileri yer almaktadır.☆22Jul 2, 2025Updated 8 months ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- ☆13Mar 23, 2023Updated 2 years ago
- Docker container escape enumeration tool.☆12Jan 23, 2021Updated 5 years ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- ☆12Nov 22, 2016Updated 9 years ago
- CVE-2019-16113 - bludit >= 3.9.2 RCE authenticate☆13Jun 5, 2020Updated 5 years ago
- Spring4Shell reproduce☆11Apr 1, 2022Updated 3 years ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆13Aug 8, 2023Updated 2 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 8 years ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010 AKA EternalBlue☆12Dec 31, 2018Updated 7 years ago
- Automated tool for domains & Subdomains Gathering☆14Updated this week
- This repository contains code implementation of the paper "AI-Guardian: Defeating Adversarial Attacks using Backdoors, at IEEE Security a…☆14Aug 13, 2023Updated 2 years ago
- Pentest automation resources for Burp☆15Mar 10, 2024Updated last year
- ☆12Dec 14, 2021Updated 4 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Apr 4, 2019Updated 6 years ago
- Command line $MFT record decoder☆12May 20, 2017Updated 8 years ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated 3 weeks ago
- Hi, these are some scripts that i use whenever a mobile pentest task comes up . Hope they would be helpful for someone☆13Dec 14, 2023Updated 2 years ago
- Yet another awesome fuzzers list☆15Oct 25, 2024Updated last year
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Aug 7, 2024Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- ☆13Sep 12, 2018Updated 7 years ago
- Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote cod…☆12Jul 2, 2024Updated last year
- a tools for erp penetration testing☆16Dec 26, 2019Updated 6 years ago
- HOCXSS (Cross Site Scripting)☆12May 7, 2020Updated 5 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 4 years ago
- A PoC for a malicious Confluence plugin.☆16Aug 15, 2024Updated last year
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Jun 15, 2023Updated 2 years ago
- Plug-ins for AlienVault of course.☆16Jul 5, 2017Updated 8 years ago
- SQLI labs to test error based, Blind boolean based, Time based.☆17Feb 1, 2019Updated 7 years ago