A Web Vulnerability Scanner and Patcher
☆170Feb 14, 2026Updated 2 weeks ago
Alternatives and similar repositories for Scanner-and-Patcher
Users that are interested in Scanner-and-Patcher are comparing it to the libraries listed below
Sorting:
- A POC of CVE-2022-30206☆15Sep 26, 2022Updated 3 years ago
- A POC OF CVE-2022-2274 (openssl)☆16Sep 24, 2022Updated 3 years ago
- A Ransomware Based in AES256 Algorithm☆17Jul 28, 2022Updated 3 years ago
- POC Of CVE-2022-21971☆11Oct 7, 2022Updated 3 years ago
- POC Of CVE-2022-26937☆14Oct 7, 2022Updated 3 years ago
- It Map Social Media With Photo☆30Oct 11, 2022Updated 3 years ago
- Proof of Concept of CVE-2022-30190☆38Oct 6, 2022Updated 3 years ago
- All Type Of Tools written in multipule language .☆22Oct 23, 2022Updated 3 years ago
- POC OF CVE-2022-21970☆14Oct 20, 2022Updated 3 years ago
- Find Email Spoofing Vulnerablity of domains☆97Jul 30, 2024Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆46Mar 15, 2024Updated last year
- scscanner is tool to read website status code response from the lists.☆39May 27, 2023Updated 2 years ago
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embed…☆104Dec 8, 2025Updated 2 months ago
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- Neton is a tool for getting information from Internet connected sandboxes☆97Nov 15, 2022Updated 3 years ago
- Dump place details from Google Maps like phone,email,website,and reviews☆73Jun 3, 2025Updated 9 months ago
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- Pentesting automation platform that combines hacking tools to complete assessments☆520Updated this week
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆244Jul 3, 2024Updated last year
- ☆27Aug 18, 2023Updated 2 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.☆17Jun 18, 2025Updated 8 months ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- An XSS Exploitation Tool☆338Dec 5, 2025Updated 2 months ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- POC of CVE-2022-36537☆36Jun 18, 2025Updated 8 months ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆100Oct 27, 2024Updated last year
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆219Jul 14, 2024Updated last year
- Lucifer is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python.☆25Jun 30, 2022Updated 3 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆20Apr 30, 2024Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆112Sep 17, 2025Updated 5 months ago
- A full-featured open-source Wi-Fi fuzzer☆197Sep 30, 2025Updated 5 months ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 3 years ago
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,063Feb 3, 2026Updated last month
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago