Hello Hackers ! , Shigaraki tool is all in one for finding specially admin panels , login panels from all subdomains .
☆15Jul 1, 2025Updated 8 months ago
Alternatives and similar repositories for Shigaraki
Users that are interested in Shigaraki are comparing it to the libraries listed below
Sorting:
- Publicly availalbe vulnarble by desgin vm/machines☆43Aug 10, 2022Updated 3 years ago
- Switch between two running operating systems without losing their state.☆53Jan 2, 2026Updated last month
- ☆39Dec 1, 2021Updated 4 years ago
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆15Jan 17, 2026Updated last month
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Inspired by the Tryhackme.com Room "Python for Pentesters"☆10Jun 9, 2024Updated last year
- ☆12Jul 4, 2024Updated last year
- Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан дл…☆12May 29, 2024Updated last year
- Worm is an Android post exploitation Framework to gain remote access of any Android device by exploiting Android Debug Bridge.☆14Jun 7, 2024Updated last year
- Unofficial micro-architecture optimized hardened_malloc package☆13Nov 25, 2025Updated 3 months ago
- Keep Your Sandbox Tight! – Actually just a collection of my own tight sandbox configurations.☆16Jan 22, 2025Updated last year
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 10 months ago
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated last month
- Home Lab creation project with Active Directory☆20May 13, 2025Updated 9 months ago
- The tool helps in quickly identifying vulnerabilities by examining a comprehensive list of potential paths on a website, making it useful…☆11Mar 24, 2025Updated 11 months ago
- ☆10Jun 15, 2024Updated last year
- Search over RDF schemas and OWL ontologies☆11Sep 28, 2013Updated 12 years ago
- ☆12Mar 7, 2025Updated 11 months ago
- Data Integration In Real-Time☆11Sep 8, 2022Updated 3 years ago
- RDFSpace constructs a vector space from any RDF dataset which can be used for computing similarities between resources in that dataset.☆41Nov 8, 2013Updated 12 years ago
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 10 months ago
- A service to generate Roles and kubeconfigs with the exact permissions you want☆18May 21, 2025Updated 9 months ago
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Apr 21, 2025Updated 10 months ago
- My Personal bot that helps me manage Google Meet Links,List, notes etc☆10Apr 15, 2022Updated 3 years ago
- XXE techniques☆14Oct 10, 2021Updated 4 years ago
- instagram notes api wrapper☆11Dec 16, 2024Updated last year
- CVE-2024-44000 is a vulnerability in the LiteSpeed Cache plugin, a popular WordPress plugin. This vulnerability affects session managemen…☆15Sep 6, 2024Updated last year
- ☆12May 21, 2025Updated 9 months ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 11 months ago
- A cmake template for crystal palace☆39Dec 20, 2025Updated 2 months ago
- ☆14Feb 25, 2025Updated last year
- an utility to parse sparql query into json format☆11Nov 22, 2016Updated 9 years ago
- Your bloodhound for hidden info in those JS files.☆17May 13, 2024Updated last year
- Implementation of the Linked Data Platform for Node.☆19May 22, 2013Updated 12 years ago
- ☆16Aug 2, 2025Updated 6 months ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆16Jan 7, 2025Updated last year
- An application for analysing crime and predicting them in a particular area by the use of data visualization☆13Nov 6, 2022Updated 3 years ago