Herramienta de extracción de exploits desde Shodan Exploits para facilitar la búsqueda de vulnerabilidades conocidas. 👁
☆41Sep 20, 2025Updated 8 months ago
Alternatives and similar repositories for cerberus
Users that are interested in cerberus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- H0tmCheck: email checking sin ruido, sin basura, solo resultados.☆18Dec 14, 2025Updated 5 months ago
- Red Team Scaner☆62Mar 28, 2026Updated last month
- TeleStrike is a red team utility designed for adversary simulation and security auditing of Telegram accounts. Built for educational and …☆43Aug 1, 2025Updated 9 months ago
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Mar 12, 2026Updated 2 months ago
- command control framework☆33May 10, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- BookMark and Find Subdomains, Endpoints, External Domains in your web browser.☆28Aug 1, 2025Updated 9 months ago
- Ip-Recon is a python powerful reconnaissance tool for retrieving ip address information by using Geo.ipfy API, it developed for termux a…☆38Jul 13, 2024Updated last year
- ☆24Jun 28, 2025Updated 10 months ago
- HackTheWeb is a production-ready, AI-powered web application penetration testing tool designed for security professionals and ethical hac…☆35Oct 5, 2025Updated 7 months ago
- Windows Sovereignty Tool & Recall Mitigation Agent.☆28Dec 19, 2025Updated 5 months ago
- A sophisticated GUI tool for creating malicious RAR archives that exploit the WinRAR path traversal vulnerability (CVE-2025-8088) using A…☆31Sep 4, 2025Updated 8 months ago
- Mycroft is a Offline File Analyzer and Metadata Scraper☆30Feb 21, 2026Updated 3 months ago
- Obtain a profile from car plate, including car jacking report, verified data related to vehicles registered in the Mexican SCT..☆43May 6, 2023Updated 3 years ago
- Posion: es un script capaz de escanear hosts, MAC spoofing, realizar ataque de SYNflood y sniffear FTP.☆13Jun 23, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CLIs in the browser & terminal.☆83Mar 2, 2026Updated 2 months ago
- automated Open Source Intelligence gathering☆189Nov 23, 2025Updated 5 months ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- OSINT tool that geolocates screenshots using leaked weather widget data (time, temperature, condition). Uses the same API as the Windows …☆127Jan 15, 2026Updated 4 months ago
- ☆72Updated this week
- DoS Attacks on Bluetooth Devices for pentest purposes☆35Nov 22, 2025Updated 5 months ago
- ☆14Feb 20, 2026Updated 3 months ago
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 5 months ago
- Detect and extract hidden files☆24Aug 29, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- InfoStealer and worm networking brute telnet,ftp,ssh,smb,rdp combine together both are bestfriend☆46Apr 14, 2026Updated last month
- hostagram osint tool Instagram | hostagram☆132Updated this week
- Cisco SmartInstall Exploit [CVE-2018-0171]☆18Feb 6, 2023Updated 3 years ago
- ☆14Mar 17, 2022Updated 4 years ago
- ☆28Apr 2, 2021Updated 5 years ago
- Autonomous AI-powered security scanning platform — CLI scanner, web dashboard, and one-command Docker deployment☆73Apr 24, 2026Updated 3 weeks ago
- ML-KEM key encapsulation in Swift☆11Apr 21, 2026Updated last month
- Encrypt and Decryp with secret KEY, in some apps can encrypt decrypt in the same app, and if cant can share and encrypt/decrypt on the A…☆25Feb 26, 2025Updated last year
- Uzbek cyrillic/latin alphabetic, upper/lower/capital-case, name/surname/patronymic wordlists (dictionaries) and their combinations☆13Aug 4, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Bug Hunter is a command-line tool designed to assist in the bug hunting process for web applications. It automates several tasks such as …☆139Oct 30, 2025Updated 6 months ago
- LSTAR - CobaltStrike Translated to EN☆22Jun 15, 2023Updated 2 years ago
- ☆18Sep 27, 2025Updated 7 months ago
- Advanced analysis software for APK payloads created by RATs.☆53May 5, 2026Updated 2 weeks ago
- C2 DDOS, With Method SYN, ICMP, TCP, HTTP, UDP, DNS FLOOD, Slowloris, TLS.☆31Jan 2, 2024Updated 2 years ago
- Windows anti-forensics module☆25Apr 20, 2026Updated last month
- Detection for CVE-2025-61882 & CVE-2025-61884☆36Oct 14, 2025Updated 7 months ago