Open-source stealer logs parser and visualization dashboard that structures and presents log data to facilitate analysis.
☆79Apr 9, 2026Updated last week
Alternatives and similar repositories for bron-vault
Users that are interested in bron-vault are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- good looking dashboard to query your infostealer logs☆26Jan 16, 2026Updated 3 months ago
- VulnReach builds on standard SCA output by adding reachability context - proving through static analysis, taint tracking, and live runtim…☆20Apr 5, 2026Updated last week
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- UAdmin Phishlets for common sites☆17Jun 12, 2025Updated 10 months ago
- Domain Grabber Made With Love :3☆13May 3, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- sl0ppy-PrivescTaskCreator.ps1☆41Oct 8, 2025Updated 6 months ago
- Cannahome source code and database☆12Feb 22, 2023Updated 3 years ago
- sturdy-chainsaw☆71Aug 10, 2023Updated 2 years ago
- Get information from RedLine logs☆13Jan 17, 2022Updated 4 years ago
- The Ultimate Premium Proxy List☆13Nov 28, 2025Updated 4 months ago
- Native Powers Talk demos☆16Jan 30, 2026Updated 2 months ago
- Openhunting CTI - Threat Exposure Data Breach Account (Telegram)☆68Dec 1, 2023Updated 2 years ago
- A basic but extensible Jekyll theme based on Bootstrap 5.☆22Mar 29, 2023Updated 3 years ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A completely self-hosted Bitcoin payment gateway☆12Apr 1, 2021Updated 5 years ago
- GDorks Web is a Flask-based web application that allows users to browse and retrieve random Google Dorks from the GDorks repository on Gi…☆12Jul 24, 2025Updated 8 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆57Mar 8, 2025Updated last year
- Adversary Simulation Framework☆39Aug 19, 2025Updated 7 months ago
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆23Aug 26, 2023Updated 2 years ago
- This Module Helps to Scan a Commit History of a Repo for Leakage of Secrets☆15Apr 26, 2025Updated 11 months ago
- Cyber Security Awareness Framework (CSAF)☆101Feb 17, 2026Updated 2 months ago
- Automated PoC of CVE-2021-44521☆10Feb 24, 2022Updated 4 years ago
- Ungrabber is a project i started in 2024 as a website and now as a python module to extract config from info stealer.☆26Jun 20, 2025Updated 9 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- The Twitter API allows users to log in quickly and securely with their Twitter account. In just a few simple steps, users can access thei…☆17Aug 13, 2025Updated 8 months ago
- Interactive reference guide for pentesting DevOps pipelines. 60+ tools with attack vectors. Credits: Tom & Colbert from Accenture (Fusion…☆39Oct 8, 2025Updated 6 months ago
- Latest Evilginx Modification + Custom Features such as Telegram WebHook, latest anti detection, server side query to identify and bypass …☆12Apr 30, 2024Updated last year
- PowerShell-based Windows Server Security Audit Engine by Cyb3rint3l Labs. Measures alignment with the NIS2 directive and maps findings to…☆42Feb 1, 2026Updated 2 months ago
- JaelesFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications☆22May 1, 2024Updated last year
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- SPAM filter rules for Stalwart Mail Server☆16Updated this week
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆45Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆20Jul 23, 2025Updated 8 months ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆19Dec 3, 2024Updated last year
- Generate a unique ID, à la PHP☆13Mar 4, 2021Updated 5 years ago
- hello world in different languages☆10Feb 14, 2024Updated 2 years ago
- Wrapper for concurrent batch processing of testssl.sh commands☆13Mar 15, 2019Updated 7 years ago
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆63Aug 18, 2025Updated 7 months ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated last month