☆36Apr 24, 2024Updated last year
Alternatives and similar repositories for ator
Users that are interested in ator are comparing it to the libraries listed below
Sorting:
- REST-Attacker is designed as a proof-of-concept for the feasibility of testing generic real-world REST implementations. Its goal is to pr…☆79Jan 9, 2023Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Jun 26, 2023Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 2 years ago
- OWASP Foundation web repository☆15Oct 11, 2025Updated 4 months ago
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- Site fast fuzzing with chorme extension.☆24Feb 4, 2022Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Jun 27, 2024Updated last year
- Windows Oracle Database Attack Toolkit☆80Jul 30, 2022Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 2 years ago
- ☆80Apr 18, 2023Updated 2 years ago
- keep watching new bug bounty (vulnerability) postings.☆13Apr 7, 2024Updated last year
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last week
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆129Sep 27, 2023Updated 2 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- Modular framework to exploit UPS devices☆64Mar 1, 2023Updated 3 years ago
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 2 weeks ago
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- ☆16Dec 7, 2025Updated 2 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- ☆15Dec 12, 2023Updated 2 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 6 years ago
- ☆18Feb 29, 2024Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆110Dec 11, 2023Updated 2 years ago
- Wireless Intrusion Detection System for Hak5's WiFi Coconut☆31Apr 5, 2023Updated 2 years ago
- Active Directory Password Spray Testing Utility in Go☆18Mar 22, 2024Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆66Mar 22, 2022Updated 3 years ago
- A wrapper around grep, to help you grep for things! - Improved version of gf by @tomnomnom.☆62Nov 17, 2023Updated 2 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Feb 6, 2023Updated 3 years ago
- RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a gi…☆17Jun 7, 2024Updated last year
- Burp Suite's extension to scan and crawl Single Page Applications☆107Apr 14, 2023Updated 2 years ago
- Cloud Exploit Framework☆112May 11, 2022Updated 3 years ago
- Extract metadata with SSRF (Server-Side Request Forgery)☆16Jul 23, 2022Updated 3 years ago
- ☆20Nov 5, 2025Updated 3 months ago