Herramienta de extracción de exploits desde Shodan Exploits para facilitar la búsqueda de vulnerabilidades conocidas. 👁
☆40Sep 20, 2025Updated 7 months ago
Alternatives and similar repositories for cerberus
Users that are interested in cerberus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- H0tmCheck: email checking sin ruido, sin basura, solo resultados.☆18Dec 14, 2025Updated 4 months ago
- Red Team Scaner☆61Mar 28, 2026Updated last month
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Mar 12, 2026Updated last month
- command control framework☆33Updated this week
- BookMark and Find Subdomains, Endpoints, External Domains in your web browser.☆28Aug 1, 2025Updated 9 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆23Jun 28, 2025Updated 10 months ago
- HackTheWeb is a production-ready, AI-powered web application penetration testing tool designed for security professionals and ethical hac…☆35Oct 5, 2025Updated 6 months ago
- A comprehensive WiFi penetration testing framework for security professionals☆17Jul 18, 2025Updated 9 months ago
- OSINT GPT ⌁ Cyber Intelligence – Advanced AI assistant for OSINT, DFIR, ethical hacking, red teaming, privacy & compliance. 🚀☆95Dec 12, 2025Updated 4 months ago
- Posion: es un script capaz de escanear hosts, MAC spoofing, realizar ataque de SYNflood y sniffear FTP.☆13Jun 23, 2022Updated 3 years ago
- Heramineta de analisis en red☆11Feb 13, 2023Updated 3 years ago
- automated Open Source Intelligence gathering☆189Nov 23, 2025Updated 5 months ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- OSINT tool that geolocates screenshots using leaked weather widget data (time, temperature, condition). Uses the same API as the Windows …☆128Jan 15, 2026Updated 3 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- DoS Attacks on Bluetooth Devices for pentest purposes☆34Nov 22, 2025Updated 5 months ago
- InfoStealer and worm networking brute telnet,ftp,ssh,smb,rdp combine together both are bestfriend☆45Apr 14, 2026Updated 2 weeks ago
- ToolShell scanner - CVE-2025-53770 and detection information☆19Dec 7, 2025Updated 4 months ago
- Squid SSL Proxy with SSL Bump for intercepting SSL traffic☆11Sep 10, 2025Updated 7 months ago
- Detect and extract hidden files☆23Aug 29, 2024Updated last year
- hostagram osint tool Instagram | hostagram☆131Apr 17, 2026Updated 2 weeks ago
- A PoC for batch attacks against ECC keypairs generated from short seeds.☆14Jan 20, 2025Updated last year
- CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction dir…☆17Jul 10, 2025Updated 9 months ago
- ☆28Apr 2, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆38Apr 21, 2026Updated last week
- Encrypt and Decryp with secret KEY, in some apps can encrypt decrypt in the same app, and if cant can share and encrypt/decrypt on the A…☆25Feb 26, 2025Updated last year
- CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP☆24May 11, 2025Updated 11 months ago
- Bug Hunter is a command-line tool designed to assist in the bug hunting process for web applications. It automates several tasks such as …☆139Oct 30, 2025Updated 6 months ago
- LSTAR - CobaltStrike Translated to EN☆22Jun 15, 2023Updated 2 years ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 7 months ago
- Windows anti-forensics module☆25Apr 20, 2026Updated last week
- ☆156Oct 28, 2025Updated 6 months ago
- Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)☆32Mar 27, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ReCopilot: Reverse Engineering Copilot in Binary Analysis☆42Dec 4, 2025Updated 4 months ago
- Bug Bounty Setup Tools On Fresh VPS. This scripts automatically installs top bug bounty tools and set up environment in newly installed …☆31Jan 27, 2026Updated 3 months ago
- Adjusted version of the impacket-dcomexec script to work against Windows 10☆18Oct 13, 2025Updated 6 months ago
- A vulnerable honeypot setup using Flask and SSH to capture and analyze malicious activities. Includes real-time logging and monitoring to…☆14Dec 13, 2024Updated last year
- Control your AI code editor from anywhere — right from Telegram.☆94Apr 13, 2026Updated 2 weeks ago
- React2Shell Auto Exploit: A CLI tool to exploit prototype pollution vulnerabilities (RCE) in React Server Actions☆58Dec 6, 2025Updated 4 months ago
- Drana-Infinity is a locally hosted advanced AI assistant designed and developed by IHA089. It’s built specifically for cybersecurity, eth…☆214Apr 7, 2026Updated 3 weeks ago