Central IoC scanner based on Loki
☆20Nov 12, 2021Updated 4 years ago
Alternatives and similar repositories for odin
Users that are interested in odin are comparing it to the libraries listed below
Sorting:
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 6 months ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last week
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- delosNmap | Nmap Script☆38Jan 15, 2023Updated 3 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆103May 11, 2022Updated 3 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Hunting Newly Registered Domains☆10Jan 6, 2019Updated 7 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Feb 26, 2026Updated last week
- A blog describing general hardware and software reverse engineering.☆18Jan 5, 2024Updated 2 years ago
- Extendable Python script handler for automating penetration testing.☆40Mar 3, 2023Updated 3 years ago
- ☆15Oct 25, 2022Updated 3 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated last year
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- A wrapper around tools used for subdomain enumeration, to automate the workflow, on a given domain, written in bash.☆79Aug 2, 2022Updated 3 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Dec 20, 2025Updated 2 months ago
- A Hacking and Pentesting Tool for Windows☆20Jul 17, 2025Updated 7 months ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 2 years ago
- Information Gathering Simplified.☆80Jan 17, 2023Updated 3 years ago
- Sifter - All purpose penetration testing op-center☆82Nov 23, 2022Updated 3 years ago
- An automation tool to install the most popular tools for bug bounty or pentesting.☆123Dec 29, 2025Updated 2 months ago
- ☆132Jan 25, 2023Updated 3 years ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- 💻 A Windows console remote administration tool written in Go & Intel x86 Assembly. It supports remote shell and screenshot.(使用Go和Intel x…☆82Mar 27, 2024Updated last year
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- Base16 for Shells☆19Jun 30, 2022Updated 3 years ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- Wazuh extension looking up alert data against indicators in OpenCTI threat intel☆21Feb 4, 2024Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago