☆18Sep 27, 2025Updated 6 months ago
Alternatives and similar repositories for hlahaploker
Users that are interested in hlahaploker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Mar 12, 2026Updated 2 weeks ago
- Red Team Scaner☆58Nov 25, 2025Updated 4 months ago
- Escáner ofensivo web en Python: crawling, XSS, SQLi, headers y detección WAF con bypass por proveedor (--waf-xss).☆13Updated this week
- ☆28Updated this week
- A simple TypeScript credit card generator☆11Jul 22, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An interactive Bash-based network scanning tool that provides live host discovery, port scanning, traceroute, and ping tests, featuring v…☆81Apr 3, 2025Updated 11 months ago
- An external attack surface monitoring (EASM) tool to find externally accessible documents.☆57Feb 2, 2026Updated last month
- JSBerg is a fast and efficient URL scraper that extracts links, JavaScript files, CSS files, images, and inline URLs from a list of websi…☆23Mar 19, 2025Updated last year
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆48Apr 7, 2025Updated 11 months ago
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆34Jul 13, 2025Updated 8 months ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Jul 4, 2025Updated 8 months ago
- Nuclei templates which I wrote myself☆10Jan 8, 2022Updated 4 years ago
- FARO - Document Sensitivity Detector☆10Sep 30, 2022Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- URILoot is a browser extension designed for Bug Bounty Hunters and Pentesters. Makes fetching uris easy from various sources.☆59Feb 15, 2026Updated last month
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆39Feb 3, 2025Updated last year
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆11Sep 2, 2020Updated 5 years ago
- ☆45Feb 20, 2026Updated last month
- A PoC for batch attacks against ECC keypairs generated from short seeds.☆14Jan 20, 2025Updated last year
- 一款被动扫描ssrf的burpsuite插件☆20Dec 30, 2022Updated 3 years ago
- ML-KEM key encapsulation in Swift☆11Aug 6, 2025Updated 7 months ago
- Analyze Android native `.so` files☆121Jul 28, 2025Updated 8 months ago
- Rust-powered HTTP Request Smuggling Scanner.☆116Mar 20, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Encrypt and Decryp with secret KEY, in some apps can encrypt decrypt in the same app, and if cant can share and encrypt/decrypt on the A…☆23Feb 26, 2025Updated last year
- Herramienta de BugBounty atutomatizada☆42Updated this week
- 哔哩哔哩直播弹幕点播视频推流直播☆11Nov 30, 2022Updated 3 years ago
- CISCO configuration guides☆14Feb 16, 2020Updated 6 years ago
- ☆11Apr 18, 2018Updated 7 years ago
- Reversed WintaPix Malware Source code | That targets countries in the Middle East and abuse KeServiceDescriptorTable(SSDT), persistence a…☆22Jul 6, 2024Updated last year
- ☆14Jan 2, 2026Updated 2 months ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- Files from module_3☆12Aug 24, 2020Updated 5 years ago
- PE文件打包器。将一系列的插件dll(寄生dll),打包捆绑到目标exe中,以寄生的方式改变程序的原有行为。寄生的dll完全手动装配,隐藏执行;宿主被恢复后,会被寄生dll强势再感染。☆24Jan 18, 2013Updated 13 years ago
- ☆44Updated this week
- The libtool accelerator: A miniature frontend for libtool that replaces libtool on sensible systems, and simply calls GNU libtool on eve…☆20Jun 1, 2014Updated 11 years ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 8 months ago
- SPAMer work☆10Oct 18, 2019Updated 6 years ago