ITSEC-Research / bron-vaultLinks
Open-source stealer logs dashboard with a built-in parser, designed to simplify the process of analyzing stealer log data.
☆42Updated 3 months ago
Alternatives and similar repositories for bron-vault
Users that are interested in bron-vault are comparing it to the libraries listed below
Sorting:
- ☆94Updated 7 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆103Updated 2 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆153Updated last month
- ☆190Updated 6 months ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆98Updated 4 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆276Updated 2 weeks ago
- Search for all leaked keys/secrets using one regex! bugbounty☆142Updated 7 months ago
- AI/LLM local model integration for analysis of reconftw results☆84Updated 6 months ago
- RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a gi…☆16Updated last year
- ⚡ XSSuccessor is a powerful, asynchronous Cross-Site Scripting (XSS) detection tool.☆57Updated 10 months ago
- Automate Scoping, OSINT and Recon assessments.☆98Updated last week
- Analyze Android native `.so` files☆87Updated 3 months ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆66Updated 5 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆127Updated 7 months ago
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enu…☆108Updated 4 months ago
- ☆78Updated 4 months ago
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆99Updated last year
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆211Updated 2 months ago
- Mining URLs from Wayback Machine for bug hunting/fuzzing/further probing☆55Updated 2 years ago
- A real fake social engineering app☆127Updated 3 months ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆45Updated 7 months ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆67Updated last year
- A collection of config files for linux focusing on hackthebox theme☆53Updated 3 weeks ago
- SubOwner - A Simple tool check for subdomain takeovers.☆117Updated last year
- ☆47Updated 8 months ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆102Updated 3 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆130Updated 9 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated last year
- A command-line utility for performing reverse DNS lookups☆74Updated 2 years ago