ITSEC-Research / bron-vaultLinks
Open-source stealer logs parser and visualization dashboard that structures and presents log data to facilitate analysis.
☆64Updated last week
Alternatives and similar repositories for bron-vault
Users that are interested in bron-vault are comparing it to the libraries listed below
Sorting:
- ☆95Updated 9 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆327Updated 3 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆154Updated 4 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆108Updated 5 months ago
- ⚡ XSSuccessor is a powerful, asynchronous Cross-Site Scripting (XSS) detection tool.☆55Updated last year
- AI/LLM local model integration for analysis of reconftw results☆89Updated 8 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆124Updated last year
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆98Updated 6 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆117Updated last year
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆225Updated 5 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated last year
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆29Updated 7 months ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆66Updated 7 months ago
- Discovering Typo Squatting on your domains!☆80Updated last year
- ☆195Updated 9 months ago
- Search for all leaked keys/secrets using one regex! bugbounty☆182Updated 10 months ago
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆159Updated 5 months ago
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆44Updated last year
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆120Updated 4 months ago
- ☆53Updated last year
- Scripts to download every Wordpress plugin (updated in the last 2 years) and run Semgrep over the lot of it while storing output in a dat…☆89Updated 11 months ago
- Automate Scoping, OSINT and Recon assessments.☆103Updated last week
- Openhunting CTI - Threat Exposure Data Breach Account (Telegram)☆66Updated 2 years ago
- 📲 Apepe is a project developed to help to capture informations from a Android app through his APK file. It can be used to extract the co…☆141Updated 3 months ago
- Passive leak enumeration tool.☆244Updated last week
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆147Updated 2 weeks ago
- ☆82Updated 7 months ago
- RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a gi…☆17Updated last year
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆131Updated last year