Open-source stealer logs parser and visualization dashboard that structures and presents log data to facilitate analysis.
☆76Mar 9, 2026Updated 2 weeks ago
Alternatives and similar repositories for bron-vault
Users that are interested in bron-vault are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AI-Driven Breach and Attack Simulation Tool (Initial Proof of Concept for AI Pentest Copilot)☆26Jan 6, 2025Updated last year
- ☆20Feb 14, 2026Updated last month
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- Super light, super fast, unlimited search idea☆25Aug 3, 2025Updated 7 months ago
- Domain Grabber Made With Love :3☆13May 3, 2025Updated 10 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆33Jul 31, 2025Updated 7 months ago
- sl0ppy-PrivescTaskCreator.ps1☆40Oct 8, 2025Updated 5 months ago
- Massive scanner to detect exposed .env files across multiple targets.☆13Jan 10, 2026Updated 2 months ago
- VulScanner - is a powerful, multi-faceted tool designed for security professionals, developers, and penetration testers to perform automa…☆36Jul 29, 2025Updated 7 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- Tool to parse Stealer Logs.☆20Aug 2, 2023Updated 2 years ago
- DursGo - The Go-Powered Web Application Scanner - With AI-Powered Analysis☆62Updated this week
- Adversary Simulation Framework☆38Aug 19, 2025Updated 7 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆55Mar 8, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆22Aug 26, 2023Updated 2 years ago
- This Module Helps to Scan a Commit History of a Repo for Leakage of Secrets☆15Apr 26, 2025Updated 11 months ago
- DursVuln - Nmap Scripting Engine (NSE)☆21Jul 16, 2025Updated 8 months ago
- Automated PoC of CVE-2021-44521☆10Feb 24, 2022Updated 4 years ago
- A curated list of resources for genealogical research using open-source intelligence (OSINT).☆16Jan 10, 2025Updated last year
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- Patches needed to build VMware (Player and Workstation) host modules against recent kernels☆17Sep 20, 2025Updated 6 months ago
- XSS Payload Cheat Sheet☆11Sep 1, 2024Updated last year
- Beelzebub all in one Hacking Tools, Shell finder, Zone-H Grabber, ReverseIP, SMTP Finder, XMLRPC BF and more☆42May 27, 2025Updated 10 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Simple and strong password generator that your mother loves it and it works well for her.☆23Jan 26, 2013Updated 13 years ago
- Latest Evilginx Modification + Custom Features such as Telegram WebHook, latest anti detection, server side query to identify and bypass …☆12Apr 30, 2024Updated last year
- JaelesFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications☆22May 1, 2024Updated last year
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- SPAM filter rules for Stalwart Mail Server☆15Dec 16, 2025Updated 3 months ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆43Jan 18, 2026Updated 2 months ago
- ☆20Jul 23, 2025Updated 8 months ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆19Dec 3, 2024Updated last year
- Generate a unique ID, à la PHP☆13Mar 4, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- r2con CTFD themes☆15Dec 23, 2021Updated 4 years ago
- Wrapper for concurrent batch processing of testssl.sh commands☆13Mar 15, 2019Updated 7 years ago
- Exploit for CVE-2021-27342 vulnerability (telnet authentication brute-force protection bypass)☆14May 15, 2021Updated 4 years ago
- hello world in different languages☆10Feb 14, 2024Updated 2 years ago
- Official Deployment Scripts for Learning Locker☆11Apr 30, 2025Updated 10 months ago
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆62Aug 18, 2025Updated 7 months ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated last month