"Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performing code review in Web Application Developing or Source Code Analysis processes.
☆39May 20, 2024Updated last year
Alternatives and similar repositories for SucoshScanny
Users that are interested in SucoshScanny are comparing it to the libraries listed below
Sorting:
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated last year
- ☆10Jul 8, 2024Updated last year
- ☆10Feb 20, 2026Updated 2 weeks ago
- ☆12Sep 23, 2023Updated 2 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- ☆13Jun 14, 2024Updated last year
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 3 years ago
- Pinger is a tool to ping the ip addresses in files such as excel or csv to show if the hosts are turned on.☆12Feb 9, 2020Updated 6 years ago
- Fuzzy test rules (include Sqli xss Lfi and so on)☆17Nov 7, 2017Updated 8 years ago
- ☆49Jan 14, 2025Updated last year
- Unique wordlist generator of unique wordlists.☆41Jul 20, 2023Updated 2 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Nov 28, 2025Updated 3 months ago
- I share the solutions and scripts of the questions I like in the CTF I enter.☆18Feb 16, 2024Updated 2 years ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆39Sep 16, 2025Updated 5 months ago
- A sophisticated PowerShell script that stealthily injects Base64-encoded shellcode into the target process, featuring anti-debugging tech…☆24Jun 8, 2024Updated last year
- ☆28Oct 15, 2025Updated 4 months ago
- ☆23Dec 2, 2022Updated 3 years ago
- Exploit for CVE-2023-32364☆23Sep 26, 2023Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- Simple network tools written with Scapy.☆23Mar 22, 2016Updated 9 years ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- simple webshell scanner☆49Mar 26, 2021Updated 4 years ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆41Dec 2, 2025Updated 3 months ago
- Cloud Pentesting Resource Collection☆35Jan 10, 2024Updated 2 years ago
- Tool to spray AWS Console IAM Logins☆35Jun 15, 2022Updated 3 years ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 6 months ago
- ☆11Sep 26, 2021Updated 4 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Feb 15, 2022Updated 4 years ago
- User enumeration and password spraying tool for testing Azure AD☆71Mar 3, 2022Updated 4 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 5 months ago
- Scanner for the SkeletonKey Malware☆30Jan 20, 2015Updated 11 years ago
- A collection of automation scripts for bug bounty hunting.☆32Feb 4, 2023Updated 3 years ago
- ☆35Feb 3, 2025Updated last year
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Nov 22, 2019Updated 6 years ago
- ☆33Aug 14, 2020Updated 5 years ago
- Online diary is a PHP app by which you can write your feeling and keep it private or share with people and you can also read other post o…☆10Jul 5, 2015Updated 10 years ago