Neo23x0 / mongobleed-detectorLinks
Detection Script for MongoBleed Exploitation
☆39Updated this week
Alternatives and similar repositories for mongobleed-detector
Users that are interested in mongobleed-detector are comparing it to the libraries listed below
Sorting:
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Updated 9 months ago
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆261Updated this week
- AntiHunter Perimeter Defense Systems☆58Updated this week
- Guardian is a production-ready AI-powered penetration testing automation CLI tool that leverages Google Gemini and LangChain to orchestra…☆207Updated last week
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆93Updated 3 months ago
- An external attack surface monitoring (EASM) tool to find externally accessible documents.☆51Updated last month
- Es una herramienta para hacer geolocalizacion - hecha en python - es multifuente y correlaciona info de multiples fuentes☆31Updated 4 months ago
- NavSec is the most comprehensive passive web vulnerability and privacy scanner. It performs real-time security analysis directly in your …☆23Updated 3 months ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆102Updated 2 months ago
- It’s an OSINT reconnaissance poc powered by Local LLMs (Ollama). You can feed it an email, domain, or IP, and it automatically performs m…☆70Updated last month
- AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs☆182Updated last month
- An interactive Bash-based network scanning tool that provides live host discovery, port scanning, traceroute, and ping tests, featuring v…☆46Updated 8 months ago
- BlackMail is a tool for creating and sending spoof mail.☆39Updated 2 years ago
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆83Updated 3 weeks ago
- TorrentSpyder is a command-line utility designed to retrieve Torrent Download History based on a specified IP address.☆17Updated last year
- RF-modulated high fidelity laser microphone and keystroke sniffer☆84Updated last year
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆19Updated 4 months ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Updated 6 months ago
- AutoPentestX – Linux Automated Pentesting & Vulnerability Reporting Tool☆62Updated last month
- Darkweb_Crawler - is an advanced, stealthy Python-based dark web intelligence platform designed for authorized security professionals and…☆105Updated 3 weeks ago
- ☆37Updated 2 weeks ago
- An all-in-one Shodan & ZoomEye supported tool to search, browse, preview and dump data leakage across 20+ services. Pulls real exposure s…☆38Updated last month
- An OSINT tool for searching DuckDuckGo via Tor using search dorks.☆22Updated 7 months ago
- Awesome Security Feeds a curated, structured and automation-friendly collection of security RSS/Atom sources. Based on https://securityfe…☆24Updated this week
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated last year
- EmailCrawl - is a professional-grade OSINT (Open Source Intelligence) tool designed for advanced email address extraction through compreh…☆113Updated last month
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆67Updated 5 months ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆31Updated 8 months ago
- NeuroSploitv2 is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive secu…☆211Updated last week
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year