ITSEC-Research / bron-vaultLinks
Open-source stealer logs dashboard with a built-in parser, designed to simplify the process of analyzing stealer log data.
☆51Updated this week
Alternatives and similar repositories for bron-vault
Users that are interested in bron-vault are comparing it to the libraries listed below
Sorting:
- ☆95Updated 7 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆103Updated 3 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆309Updated last month
- ☆190Updated 7 months ago
- ⚡ XSSuccessor is a powerful, asynchronous Cross-Site Scripting (XSS) detection tool.☆57Updated 10 months ago
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆78Updated 7 months ago
- AI/LLM local model integration for analysis of reconftw results☆84Updated 6 months ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆98Updated 4 months ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆68Updated last year
- Analyze Android native `.so` files☆110Updated 4 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated last year
- ☆79Updated 5 months ago
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆45Updated last year
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆111Updated 2 months ago
- Openhunting CTI - Threat Exposure Data Breach Account (Telegram)☆57Updated last year
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆66Updated 5 months ago
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆111Updated last year
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆41Updated 9 months ago
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enu…☆108Updated 5 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆153Updated 2 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆124Updated 11 months ago
- Automate Scoping, OSINT and Recon assessments.☆99Updated last month
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆34Updated 2 months ago
- ☆47Updated 8 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆214Updated 3 months ago
- RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a gi…☆16Updated last year
- Search for all leaked keys/secrets using one regex! bugbounty☆144Updated 8 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆118Updated last year
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆102Updated 4 months ago