Herramienta de extracción de exploits desde Shodan Exploits para facilitar la búsqueda de vulnerabilidades conocidas. 👁
☆41Sep 20, 2025Updated 6 months ago
Alternatives and similar repositories for cerberus
Users that are interested in cerberus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TeleStrike is a red team utility designed for adversary simulation and security auditing of Telegram accounts. Built for educational and …☆45Aug 1, 2025Updated 8 months ago
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Mar 12, 2026Updated 3 weeks ago
- command control framework☆33Apr 3, 2026Updated last week
- BookMark and Find Subdomains, Endpoints, External Domains in your web browser.☆28Aug 1, 2025Updated 8 months ago
- Ip-Recon is a python powerful reconnaissance tool for retrieving ip address information by using Geo.ipfy API, it developed for termux a…☆38Jul 13, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆23Jun 28, 2025Updated 9 months ago
- HackTheWeb is a production-ready, AI-powered web application penetration testing tool designed for security professionals and ethical hac…☆33Oct 5, 2025Updated 6 months ago
- Windows Sovereignty Tool & Recall Mitigation Agent.☆27Dec 19, 2025Updated 3 months ago
- Mycroft is a Offline File Analyzer and Metadata Scraper☆29Feb 21, 2026Updated last month
- A sophisticated GUI tool for creating malicious RAR archives that exploit the WinRAR path traversal vulnerability (CVE-2025-8088) using A…☆28Sep 4, 2025Updated 7 months ago
- A comprehensive WiFi penetration testing framework for security professionals☆17Jul 18, 2025Updated 8 months ago
- Obtain a profile from car plate, including car jacking report, verified data related to vehicles registered in the Mexican SCT..☆41May 6, 2023Updated 2 years ago
- OSINT GPT ⌁ Cyber Intelligence – Advanced AI assistant for OSINT, DFIR, ethical hacking, red teaming, privacy & compliance. 🚀☆93Dec 12, 2025Updated 3 months ago
- automated Open Source Intelligence gathering☆189Nov 23, 2025Updated 4 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- CLIs in the browser & terminal.☆76Mar 2, 2026Updated last month
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- OSINT tool that geolocates screenshots using leaked weather widget data (time, temperature, condition). Uses the same API as the Windows …☆127Jan 15, 2026Updated 2 months ago
- Herramienta de OSINT para WhatsApp que permite obtener fotos de perfil, verificar cuentas Business, consultar estado e información de usu…☆123Sep 12, 2025Updated 6 months ago
- ☆56Apr 3, 2026Updated last week
- ScanKDea es un escáner de seguridad avanzado en Python diseñado para profesionales de ciberseguridad y auditorías éticas. Ofrece capacida…☆24May 30, 2025Updated 10 months ago
- hostagram osint tool Instagram | hostagram 1.4☆111Mar 28, 2026Updated 2 weeks ago
- DoS Attacks on Bluetooth Devices for pentest purposes☆33Nov 22, 2025Updated 4 months ago
- InfoStealer and worm networking brute telnet,ftp,ssh,smb,rdp combine together both are bestfriend☆35Updated this week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Detect and extract hidden files☆22Aug 29, 2024Updated last year
- A PoC for batch attacks against ECC keypairs generated from short seeds.☆14Jan 20, 2025Updated last year
- Cisco SmartInstall Exploit [CVE-2018-0171]☆18Feb 6, 2023Updated 3 years ago
- Autonomous AI-powered security scanning platform — CLI scanner, web dashboard, and one-command Docker deployment☆52Mar 29, 2026Updated last week
- ☆28Apr 2, 2021Updated 5 years ago
- ☆14Mar 17, 2022Updated 4 years ago
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆53Jan 11, 2025Updated last year
- Repositorio de ciberseguridad aeroespacial en español☆25Jan 10, 2025Updated last year
- ☆38Feb 27, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Encrypt and Decryp with secret KEY, in some apps can encrypt decrypt in the same app, and if cant can share and encrypt/decrypt on the A…☆24Feb 26, 2025Updated last year
- Advanced analysis software for APK payloads created by RATs.☆36Updated this week
- CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP☆24May 11, 2025Updated 11 months ago
- Uzbek cyrillic/latin alphabetic, upper/lower/capital-case, name/surname/patronymic wordlists (dictionaries) and their combinations☆12Aug 4, 2022Updated 3 years ago
- LSTAR - CobaltStrike Translated to EN☆22Jun 15, 2023Updated 2 years ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 6 months ago
- ☆18Sep 27, 2025Updated 6 months ago