MustafaBilgici / SucoshScanny
"Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performing code review in Web Application Developing or Source Code Analysis processes.
☆34Updated 10 months ago
Alternatives and similar repositories for SucoshScanny:
Users that are interested in SucoshScanny are comparing it to the libraries listed below
- ☆12Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- ☆93Updated last year
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆23Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- A simple pentest container equipped with common python pentest tools.☆41Updated last month
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- ☆29Updated 3 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Challenge Python☆19Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆58Updated 3 months ago
- ☆18Updated last year
- ☆12Updated 3 years ago
- ☆42Updated last month
- Web Hacking and Red Teaming MindMap☆70Updated 2 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆49Updated last year
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Updated last year
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆31Updated 9 months ago
- This is an AD pentest tools collection☆55Updated 8 months ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 7 months ago
- A tool for Subdomain takeovers detection☆26Updated 2 years ago
- Tools used for Pentesting☆22Updated last year
- ☆42Updated 2 years ago
- A curated list wordlists for bruteforcing and fuzzing☆82Updated last year
- ☆76Updated 3 years ago
- ☆26Updated 6 months ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆53Updated 4 months ago