An advanced XSS vulnerability scanner.
☆11Feb 24, 2025Updated last year
Alternatives and similar repositories for NeuroPwn
Users that are interested in NeuroPwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated 2 months ago
- Kismetdb database log helper library (mirrored from Kismet repos)☆18Feb 2, 2022Updated 4 years ago
- ☆18Oct 9, 2023Updated 2 years ago
- Grep subdomains from web pages.☆42Feb 10, 2025Updated last year
- Automated enumeration for red teamers☆11Nov 22, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- MED3 is a cutting-edge Electronic Health Record (EHR) system that utilizes blockchain technology for secure and efficient health data man…☆20May 15, 2023Updated 2 years ago
- ☆12Nov 12, 2023Updated 2 years ago
- Use Rust to implement some Red Team techniques :)☆13Nov 11, 2024Updated last year
- simple task management application built using the MERN stack☆18Dec 3, 2025Updated 3 months ago
- C++ keylogger to save all the keys pressed into a local txt file☆11Apr 6, 2023Updated 2 years ago
- Encrypt any C# binary or bin file☆12Aug 1, 2024Updated last year
- Acunetix Professional v24.1☆19Mar 2, 2024Updated 2 years ago
- OSWE-cheat sheet module by module with updated syllabus☆12May 25, 2021Updated 4 years ago
- ☆11Sep 15, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Bug Bounty Resources from Scratch to start Hunting Bugs☆36Feb 21, 2025Updated last year
- 学习笔记☆13Mar 4, 2022Updated 4 years ago
- Learn binary exploitation from angelboy's hitcon-training☆37Sep 5, 2017Updated 8 years ago
- CamHawk is a camera phishing tool that tricks users into granting webcam access. Once permission is granted, the tool captures images fro…☆33Mar 15, 2026Updated last week
- A powershell poc to load and automatically run Certify and Rubeus from memory.☆17Aug 17, 2022Updated 3 years ago
- PEN-300 collection to help you on your exam.☆13Apr 19, 2022Updated 3 years ago
- AI/LLM local model integration for analysis of reconftw results☆96May 3, 2025Updated 10 months ago
- The Ultimate Studio Ghibli Style AI Image Generator☆10Mar 27, 2025Updated last year
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆34Mar 8, 2026Updated 2 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Code samples of querying the API services of Whois XML Api.☆12Dec 14, 2023Updated 2 years ago
- Active monitoring bug bounty programs tool☆49Jan 21, 2026Updated 2 months ago
- Exploit for CVE-2018-7600.. called drupalgeddon2,☆11Apr 19, 2018Updated 7 years ago
- [Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.☆15Nov 9, 2013Updated 12 years ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆28Mar 11, 2022Updated 4 years ago
- 🔑 Wi-Fi Captive Portal For NodeMCU for Phishing Wi-Fi Passwords☆22Aug 2, 2024Updated last year
- ☆78Aug 1, 2023Updated 2 years ago
- Useful Apple macOS Automator & Shortcuts Scripts 苹果系统自动操作、快捷指令脚本☆18Dec 20, 2021Updated 4 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- load dumped csharp binaries as assemblies and launch them in memory☆28Feb 9, 2024Updated 2 years ago
- ⚡ XSSuccessor is a powerful, asynchronous Cross-Site Scripting (XSS) detection tool.☆56Updated this week
- ☆13Jan 15, 2026Updated 2 months ago
- WebSocket Penetration Testing Toolkit for Burp Suite☆29Mar 5, 2026Updated 3 weeks ago
- A simple bug bounty utility tool to remove uninteresting entries from a list of URLs.☆14Jul 22, 2024Updated last year
- ☆18Nov 2, 2024Updated last year
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year