OsmanKandemir / static-code-analysis-helperLinks
Static-Code-Analysis-Helper helps you perform static code analysis.
β32Updated last month
Alternatives and similar repositories for static-code-analysis-helper
Users that are interested in static-code-analysis-helper are comparing it to the libraries listed below
Sorting:
- π€ The Modern, Blazing Fast Port Scanner π€β28Updated last year
- Laravel RCE Exploitation Toolkitβ50Updated 3 months ago
- A Simple JS code to keylogger data and send it to the personal serverβ31Updated last year
- β65Updated last year
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.β73Updated 6 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using theβ41Updated 10 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.β75Updated last month
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β130Updated 10 months ago
- Linux post exploitation tool for info gathering and exfiltration π§π‘πβ90Updated 2 months ago
- This repository contains the best fuzzing wordlist filesβ34Updated last year
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as APIβ¦β37Updated last year
- Capture screenshots of onion services on an onion service.β73Updated last year
- An advanced scanner for exposed secrets in web pages, APIs, and source code.β12Updated 9 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cliβ¦β82Updated last year
- This is an AD pentest tools collectionβ59Updated last year
- A short graduate course on cybercrime, cyberespionage, and cyberoperationsβ83Updated 2 months ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.β55Updated 7 months ago
- Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.β208Updated last month
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.β29Updated 2 years ago
- DorkEye is a Python OSINT and reconnaissance tool designed for ethical dorking. It automates searches to detect unintentionally exposed rβ¦β72Updated last week
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.β65Updated 2 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gatheringβ‘.β60Updated last year
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types lβ¦β145Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β66Updated last year
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, aβ¦β98Updated last year
- Analyze Android native `.so` filesβ119Updated 6 months ago
- β169Updated last month
- Red Team tools containerizedβ74Updated 2 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AVβ129Updated 8 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.β45Updated last year