Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.
☆1,022Mar 21, 2025Updated last year
Alternatives and similar repositories for mantis
Users that are interested in mantis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,539Mar 21, 2026Updated 3 weeks ago
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,406Apr 2, 2026Updated last week
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆900Mar 12, 2026Updated 3 weeks ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆834Mar 24, 2026Updated 2 weeks ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,326Updated this week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,280Jul 18, 2024Updated last year
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆438Dec 30, 2025Updated 3 months ago
- The recursive internet scanner for hackers. 🧡☆9,583Updated this week
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,159Mar 8, 2026Updated last month
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,508Jan 8, 2026Updated 3 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆379Dec 5, 2023Updated 2 years ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆358Dec 14, 2023Updated 2 years ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆435Mar 28, 2026Updated 2 weeks ago
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆2,415Updated this week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆384May 19, 2023Updated 2 years ago
- Find subdomains with GPT, for free☆353Apr 18, 2024Updated last year
- The Most Advanced Client-Side Prototype Pollution Scanner☆248Mar 30, 2026Updated last week
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,963Oct 4, 2025Updated 6 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,416Mar 25, 2026Updated 2 weeks ago
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,824Apr 2, 2026Updated last week
- An offensive data enrichment pipeline☆948Apr 2, 2026Updated last week
- Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more☆3,332Mar 29, 2026Updated last week
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆461Mar 28, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Never forget where you inject.☆299Aug 15, 2025Updated 7 months ago
- AI-powered ffuf wrapper☆711Dec 4, 2025Updated 4 months ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆1,067Mar 24, 2026Updated 2 weeks ago
- ☆522Apr 29, 2024Updated last year
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,808May 22, 2024Updated last year
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,538Mar 8, 2026Updated last month
- ☆74Apr 8, 2024Updated 2 years ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆300Sep 8, 2023Updated 2 years ago
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,570Mar 16, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- secator - the pentester's swiss knife☆1,259Apr 3, 2026Updated last week
- Hidden parameters discovery suite☆2,044Sep 8, 2024Updated last year
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!☆2,588Mar 8, 2026Updated last month
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆91May 2, 2024Updated last year
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆731Mar 21, 2024Updated 2 years ago
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆502Jun 28, 2025Updated 9 months ago