"Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performing code review in Web Application Developing or Source Code Analysis processes.
☆39May 20, 2024Updated last year
Alternatives and similar repositories for SucoshScanny
Users that are interested in SucoshScanny are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ⚠️ Malware Development training ⚠️☆41Feb 24, 2025Updated last year
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated last year
- A sophisticated PowerShell script that stealthily injects Base64-encoded shellcode into the target process, featuring anti-debugging tech…☆24Jun 8, 2024Updated last year
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 3 years ago
- Pinger is a tool to ping the ip addresses in files such as excel or csv to show if the hosts are turned on.☆12Feb 9, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆41Apr 1, 2026Updated 2 weeks ago
- ☆10Jul 8, 2024Updated last year
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆18May 19, 2024Updated last year
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- ☆15Feb 12, 2023Updated 3 years ago
- ☆15Dec 12, 2023Updated 2 years ago
- I share the solutions and scripts of the questions I like in the CTF I enter.☆18Feb 16, 2024Updated 2 years ago
- ☆78Apr 25, 2023Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Feb 15, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆10Mar 27, 2022Updated 4 years ago
- MITMsmtp is an Evil SMTP Server for pentesting SMTP clients to catch login credentials and mails sent over plain or SSL encrypted connect…☆45Jan 28, 2024Updated 2 years ago
- ☆49Jan 14, 2025Updated last year
- ☆23Dec 2, 2022Updated 3 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Nov 28, 2025Updated 4 months ago
- A collection of wordlists to use with privilege escalation and password cracking tasks☆14Feb 13, 2024Updated 2 years ago
- [Phishing Tool]☆17Jul 18, 2025Updated 9 months ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Easily count site visitors with AWS Lambda and display it on your site.☆13Apr 15, 2025Updated last year
- Fast and extensible network scanning library featuring multithreading, ping probing, and scan fetchers.☆40May 1, 2020Updated 5 years ago
- A simple CDR software for disarming malicious contents contained in documents.☆10Nov 7, 2022Updated 3 years ago
- A small wifi penetration testing tool-kit☆12Jul 21, 2023Updated 2 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Nov 11, 2020Updated 5 years ago
- dontpopme bitches☆23Jun 16, 2022Updated 3 years ago
- ☆28Oct 15, 2025Updated 6 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 8 months ago
- Python'un scapy modülü kullanılarak aynı ağda bulunan cihazların ip ve mac adreslerini listeyen script.☆11Jun 24, 2020Updated 5 years ago
- 2016 Linux Yaz Kampı - Django Ders Notları☆12Aug 18, 2016Updated 9 years ago
- kubeconfig-merge is a lightweight and efficient CLI tool designed to merge multiple Kubernetes kubeconfig files into a single, well-struc…☆15Feb 18, 2025Updated last year
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆25Mar 8, 2026Updated last month
- SOC bilgileri yer almaktadır.☆22Jul 2, 2025Updated 9 months ago
- LDAP enumeration tool implemented in Python3☆224May 20, 2025Updated 10 months ago