one-stop resource for all things offensive security.
โ179Apr 21, 2026Updated last week
Alternatives and similar repositories for SUASS
Users that are interested in SUASS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fast and easy to use CLI-based file encryption program ๐ฆโ13Oct 12, 2025Updated 6 months ago
- Web Server Vulnerability Scanning Toolโ37Mar 11, 2025Updated last year
- This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, subโฆโ87Feb 14, 2026Updated 2 months ago
- seCureLI is a tool that enables you to experience the delight of building products by helping you get ideas from your head into working sโฆโ28Jul 15, 2024Updated last year
- A Powerful Network Reconnaissance Tool for Security Professionalsโ107Dec 29, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient โข AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchersโ101Apr 24, 2026Updated last week
- A Golang package for scanning private and public IPs for open TCP ports ๐๏ธโ118Mar 13, 2025Updated last year
- Collection of cheat sheets useful for pentestingโ621Jun 27, 2024Updated last year
- A How-To Guide on using Security Commands and Observing Network Traffic on Wiresharkโ18Jan 27, 2026Updated 3 months ago
- ๐ EclipseRecon is a personal project developed during my cybersecurity learning journey ๐ก๏ธ. It helps practice web reconnaissance ๐ by โฆโ30Nov 26, 2025Updated 5 months ago
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.โ71Updated this week
- Red Kite, the Extensible Attack Surface Management tool.โ91Feb 8, 2026Updated 2 months ago
- Offline Cybersecurity Knowledge Baseโ208Mar 24, 2026Updated last month
- Hastly written Tools & Scripts for Personal Use Cases & Bug Bountiesโ80Mar 6, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available โข AdRun AI, ML, and HPC workloads on powerful cloud GPUsโwithout limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Customized CVE FEED Notifierโ112Apr 22, 2025Updated last year
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.โ276Jun 16, 2024Updated last year
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.โ78Sep 1, 2025Updated 8 months ago
- PermCheck is a little tool that checks if the files in a PHP project have the executable bit set properly.โ11Updated this week
- A humble, and ๐ณ๐ฎ๐๐, security-oriented HTTP headers analyzer.โ362Updated this week
- ๐ก 802.11 broadcast analyzer & injectorโ174Jun 17, 2025Updated 10 months ago
- Identify hardcoded secrets in static structured text (version 2)โ98Feb 5, 2025Updated last year
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIsโ73Mar 1, 2024Updated 2 years ago
- Protection against HTML smuggling attacks.โ101Jul 10, 2025Updated 9 months ago
- Managed Kubernetes at scale on DigitalOcean โข AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Protect your SIP Servers from bad actors at https://sentrypeer.orgโ211Updated this week
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, dependeโฆโ16Aug 29, 2025Updated 8 months ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Geminiโ175Apr 23, 2025Updated last year
- A cybersecurity tool designed to safeguard against IDN Homograph Attacksโ47Aug 5, 2025Updated 8 months ago
- A fast network scanning tool to detect open ports and security vulnerabilities (Compatible with Debian & Red Hat OS)โ127Sep 6, 2025Updated 7 months ago
- Steganography Tool for JPG Imagesโ65Updated this week
- โ65Mar 10, 2026Updated last month
- An IAM Simulator that outputs detailed explains of how a request was evaluated.โ102Apr 26, 2026Updated last week
- Assortment of scripts and tools for our Blackhat EU 2024 talkโ106Feb 6, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer โข AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A web CTF for training developers in bug hunting and secure coding!โ100Jan 12, 2025Updated last year
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wiโฆโ32Feb 23, 2026Updated 2 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysisโฆโ552Apr 2, 2026Updated last month
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network cโฆโ44Apr 23, 2026Updated last week
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrencyโ16Updated this week
- Ephemeral, zero-knowledge, end-to-end post-quantum encrypted sensitive data sharingโ137Updated this week
- An experimental AntiBot, AntiCrawl reverse proxy for serving simple static content.โ53Sep 29, 2024Updated last year