Herramienta de extracción de exploits desde Shodan Exploits para facilitar la búsqueda de vulnerabilidades conocidas. 👁
☆23Sep 20, 2025Updated 5 months ago
Alternatives and similar repositories for cerberus
Users that are interested in cerberus are comparing it to the libraries listed below
Sorting:
- Red Team Scaner☆56Nov 25, 2025Updated 3 months ago
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Sep 11, 2025Updated 5 months ago
- TeleStrike is a red team utility designed for adversary simulation and security auditing of Telegram accounts. Built for educational and …☆44Aug 1, 2025Updated 7 months ago
- BookMark and Find Subdomains, Endpoints, External Domains in your web browser.☆28Aug 1, 2025Updated 7 months ago
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆38Feb 3, 2025Updated last year
- HackTheWeb is a production-ready, AI-powered web application penetration testing tool designed for security professionals and ethical hac…☆30Oct 5, 2025Updated 4 months ago
- Ip-Recon is a python powerful reconnaissance tool for retrieving ip address information by using Geo.ipfy API, it developed for termux a…☆37Jul 13, 2024Updated last year
- ☆156Oct 28, 2025Updated 4 months ago
- Obtain a profile from car plate, including car jacking report, verified data related to vehicles registered in the Mexican SCT..☆40May 6, 2023Updated 2 years ago
- Windows Sovereignty Tool & Recall Mitigation Agent.☆27Dec 19, 2025Updated 2 months ago
- OSINT GPT ⌁ Cyber Intelligence – Advanced AI assistant for OSINT, DFIR, ethical hacking, red teaming, privacy & compliance. 🚀☆82Dec 12, 2025Updated 2 months ago
- Uzbek cyrillic/latin alphabetic, upper/lower/capital-case, name/surname/patronymic wordlists (dictionaries) and their combinations☆11Aug 4, 2022Updated 3 years ago
- Mycroft is a Offline File Analyzer and Metadata Scraper☆26Feb 21, 2026Updated last week
- ML-KEM key encapsulation in Swift☆10Aug 6, 2025Updated 6 months ago
- ☆33Updated this week
- ☆14Feb 20, 2026Updated last week
- Herramienta de OSINT para WhatsApp que permite obtener fotos de perfil, verificar cuentas Business, consultar estado e información de usu…☆108Sep 12, 2025Updated 5 months ago
- automated Open Source Intelligence gathering☆187Nov 23, 2025Updated 3 months ago
- ☆14Aug 1, 2025Updated 6 months ago
- ☆23Jun 28, 2025Updated 8 months ago
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆13May 25, 2025Updated 9 months ago
- CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction dir…☆15Jul 10, 2025Updated 7 months ago
- A sophisticated GUI tool for creating malicious RAR archives that exploit the WinRAR path traversal vulnerability (CVE-2025-8088) using A…☆23Sep 4, 2025Updated 5 months ago
- Escáner básico de vulnerabilidades web (XSS, SQLi, cabeceras) con crawling ligero, escrito en Python.☆12Nov 23, 2025Updated 3 months ago
- pXLabs.WindowsUpdateTool is a user-friendly, WPF-based PowerShell utility designed to simplify and enhance the management of Windows Upda…☆15Jun 5, 2025Updated 8 months ago
- Heramineta de analisis en red☆11Feb 13, 2023Updated 3 years ago
- Squid SSL Proxy with SSL Bump for intercepting SSL traffic☆10Sep 10, 2025Updated 5 months ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 5 months ago
- A comprehensive WiFi penetration testing framework for security professionals☆16Jul 18, 2025Updated 7 months ago
- SMSBOX is a tool to send anonymous messages. This script uses the Textbelt API to work, Textbelt is an API that allows us to send a singl…☆17Jul 1, 2025Updated 7 months ago
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 2 months ago
- Проект помогает фронтенд-разработчикам освоить структуры данных через практиче ские примеры на JavaScript☆21Sep 14, 2025Updated 5 months ago
- A PoC for batch attacks against ECC keypairs generated from short seeds.☆14Jan 20, 2025Updated last year
- A vulnerable honeypot setup using Flask and SSH to capture and analyze malicious activities. Includes real-time logging and monitoring to…☆14Dec 13, 2024Updated last year
- hostagram osint tool Instagram | hostagram 1.4☆103Feb 5, 2026Updated 3 weeks ago
- Bug Hunter is a command-line tool designed to assist in the bug hunting process for web applications. It automates several tasks such as …☆130Oct 30, 2025Updated 4 months ago
- ScanKDea es un escáner de seguridad avanzado en Python diseñado para profesionales de ciberseguridad y auditorías éticas. Ofrece capacida…☆23May 30, 2025Updated 9 months ago
- Cisco SmartInstall Exploit [CVE-2018-0171]☆18Feb 6, 2023Updated 3 years ago
- A multi-model AI platform for comics, manga, and videos. It colorizes black-and-white manga, translates comics into multiple languages, a…☆16Feb 11, 2026Updated 2 weeks ago