ITSEC-Research / bron-vaultLinks
Open-source stealer logs dashboard with a built-in parser, designed to simplify the process of analyzing stealer log data.
☆38Updated last month
Alternatives and similar repositories for bron-vault
Users that are interested in bron-vault are comparing it to the libraries listed below
Sorting:
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆130Updated last week
- ☆94Updated 5 months ago
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enu…☆106Updated 3 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated 11 months ago
- ☆190Updated 5 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆84Updated 11 months ago
- ⚡ XSSuccessor is a powerful, asynchronous Cross-Site Scripting (XSS) detection tool.☆57Updated 8 months ago
- Automate Scoping, OSINT and Recon assessments.☆96Updated 7 months ago
- Analyze Android native `.so` files☆81Updated last month
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆124Updated this week
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆63Updated 3 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆101Updated last month
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆121Updated 6 months ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆49Updated 3 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆142Updated last year
- ☆65Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆151Updated this week
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆79Updated last year
- A real fake social engineering app☆128Updated 2 months ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆67Updated last year
- Search for all leaked keys/secrets using one regex! bugbounty☆138Updated 5 months ago
- Discovering Typo Squatting on your domains!☆71Updated last year
- ☆55Updated last year
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆138Updated 8 months ago
- A command-line utility for performing reverse DNS lookups☆73Updated 2 years ago
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆98Updated last year
- AI/LLM local model integration for analysis of reconftw results☆80Updated 4 months ago
- NetProbe: Network Probe☆164Updated 11 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆207Updated 5 months ago