MustafaBilgici / SucoshScannyView external linksLinks
"Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performing code review in Web Application Developing or Source Code Analysis processes.
☆39May 20, 2024Updated last year
Alternatives and similar repositories for SucoshScanny
Users that are interested in SucoshScanny are comparing it to the libraries listed below
Sorting:
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated 11 months ago
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 10 months ago
- ☆10Jul 8, 2024Updated last year
- ☆10Nov 15, 2025Updated 3 months ago
- ☆12Sep 23, 2023Updated 2 years ago
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 3 years ago
- Pinger is a tool to ping the ip addresses in files such as excel or csv to show if the hosts are turned on.☆12Feb 9, 2020Updated 6 years ago
- ☆13Jun 14, 2024Updated last year
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆17May 19, 2024Updated last year
- A collection of wordlists to use with privilege escalation and password cracking tasks☆14Feb 13, 2024Updated 2 years ago
- Fuzzy test rules (include Sqli xss Lfi and so on)☆17Nov 7, 2017Updated 8 years ago
- ☆49Jan 14, 2025Updated last year
- Unique wordlist generator of unique wordlists.☆41Jul 20, 2023Updated 2 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- I share the solutions and scripts of the questions I like in the CTF I enter.☆18Feb 16, 2024Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Nov 28, 2025Updated 2 months ago
- A sophisticated PowerShell script that stealthily injects Base64-encoded shellcode into the target process, featuring anti-debugging tech…☆23Jun 8, 2024Updated last year
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆39Sep 16, 2025Updated 5 months ago
- ☆28Oct 15, 2025Updated 4 months ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆24Jan 5, 2023Updated 3 years ago
- Exploit for CVE-2023-32364☆22Sep 26, 2023Updated 2 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Simple network tools written with Scapy.☆23Mar 22, 2016Updated 9 years ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Cloud Pentesting Resource Collection☆33Jan 10, 2024Updated 2 years ago
- Tool to spray AWS Console IAM Logins☆35Jun 15, 2022Updated 3 years ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆40Dec 2, 2025Updated 2 months ago
- LDAP enumeration tool implemented in Python3☆224May 20, 2025Updated 8 months ago
- ☆11Sep 26, 2021Updated 4 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Feb 15, 2022Updated 4 years ago
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆79Feb 7, 2026Updated last week
- Scanner for the SkeletonKey Malware☆30Jan 20, 2015Updated 11 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Nov 11, 2020Updated 5 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 4 months ago
- A collection of automation scripts for bug bounty hunting.☆32Feb 4, 2023Updated 3 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Nov 22, 2019Updated 6 years ago