Workflow automation for Security Teams
☆329Apr 16, 2026Updated 2 weeks ago
Alternatives and similar repositories for studio
Users that are interested in studio are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆59Apr 10, 2026Updated 3 weeks ago
- CVE-2020-10204 远程命令执行脚本☆13May 27, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Py Minutiae Viewer is a cross-platform, multi-format minutiae viewer.☆12Dec 5, 2019Updated 6 years ago
- Simple LLM service identification - translate IP:Port to Ollama, vLLM, LiteLLM, or 60+ other AI services in seconds☆64Updated this week
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆70Jul 6, 2025Updated 9 months ago
- A Dissect module implementing a parser for Microsofts Extensible Storage Engine Database (ESEDB), used for example in Active Directory, E…☆25Nov 20, 2025Updated 5 months ago
- [CVE-2019-18935] Telerik UI for ASP.NET AJAX (RadAsyncUpload Handler) .NET JSON Deserialization☆16Aug 25, 2020Updated 5 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities☆62Mar 1, 2026Updated 2 months ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆17May 19, 2024Updated last year
- Phantom is project created to perform loading and executing unmanaged code in memory within an IIS environment running in full‑trust mode…☆103Apr 27, 2026Updated last week
- ☆29Nov 25, 2025Updated 5 months ago
- This extension provides a central location for viewing all GraphQL requests/responses within a Burp project. It provides a clean UI that …☆15Feb 24, 2022Updated 4 years ago
- All Items Related to bug bounty☆13Aug 8, 2025Updated 8 months ago
- Tools for attacking Computer Use Agents☆30Jan 16, 2026Updated 3 months ago
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python F…☆16Sep 2, 2022Updated 3 years ago
- AWS CloudWatch Events Collector☆13Feb 3, 2026Updated 3 months ago
- Public Disclosed Bug Bounty Reports formated in markdown☆91May 31, 2025Updated 11 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 9 years ago
- Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)☆104Apr 4, 2026Updated last month
- Reverse whois query tool☆11Jul 28, 2016Updated 9 years ago
- A super-fast proxy server port scanner一个超级快的端口扫描器☆24Aug 31, 2025Updated 8 months ago
- ☆23Nov 13, 2021Updated 4 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- An authentication proxy for Google Cloud managed databases☆26Mar 28, 2023Updated 3 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆26Jul 31, 2025Updated 9 months ago
- Multithreaded Host Header Redirection Scanner☆14Nov 10, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- fast, zero config web endpoint change monitor☆43Aug 4, 2020Updated 5 years ago
- Turn any LLM into an autonomous pentester. You define the scope, the agent does the work, you review the findings.☆352Updated this week
- File indexer with semantic search, hybrid retrieval, and multi-step reasoning agents☆20Jan 17, 2026Updated 3 months ago
- A simple way to add Minecraft authentication to your website or project☆16Nov 15, 2025Updated 5 months ago
- ☆25Feb 18, 2025Updated last year
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆36Oct 17, 2021Updated 4 years ago
- Example of using Pusher Channels with Asyncio and FastAPI☆11Jun 10, 2020Updated 5 years ago