GoInspect identifies website technologies and checks for known vulnerabilities using the NVD API, providing CVE IDs, descriptions, and severity levels for enhanced security analysis and vulnerability assessment.
☆10Jan 22, 2025Updated last year
Alternatives and similar repositories for GoInspect
Users that are interested in GoInspect are comparing it to the libraries listed below
Sorting:
- Slack Parser is a script to parse slack database and extract user-data, chat history, workspace information☆16Feb 21, 2021Updated 5 years ago
- URLs for Exploit (UFX) is a powerful, modular, and extensible tool designed for security researchers, penetration testers, and developers…☆17Jan 30, 2025Updated last year
- ☆20Jan 16, 2026Updated last month
- Sneak past firewalls and exfiltrate data covertly. Encrypt your payload, disguise it as ICMP pings, and bypass network restrictions effor…☆24Apr 8, 2024Updated last year
- A collection of resources for budding AI hackers☆25Jun 30, 2023Updated 2 years ago
- A JavaScript library to ruin someone’s day.☆88Aug 26, 2016Updated 9 years ago
- A curated list of awesome blockchain security resources☆33Dec 15, 2023Updated 2 years ago
- Penetration Testing/Security Cheatsheets☆65Oct 31, 2015Updated 10 years ago
- HackLiners: CyberSec/BugHunting OneLiners☆62Oct 16, 2024Updated last year
- This repository is my own list of tools / useful stuff for pentest, defensive activities, programming, lockpicking and physical security☆64Dec 1, 2022Updated 3 years ago
- Tool to find code cave in PE image (x86 / x64) - Find empty space to place code in PE files☆72Aug 1, 2023Updated 2 years ago
- A dynamic cheat sheet for PEN-200, OSCP, and other pentests made with Google Sheets☆82Jun 17, 2024Updated last year
- `vind` is a tool to create and manage a cluster of containers that look and work like virtual machines, on Docker.☆76Jul 29, 2025Updated 7 months ago
- ⚡️ Quick and easy searching tasks in one library.☆83Dec 12, 2025Updated 2 months ago
- HackerToolkit offers a curated selection of tools designed to enhance your hacking capabilities. This repository not only organizes these…☆100May 14, 2024Updated last year
- 🚀 Production-ready Next.js template with PocketBase and shadcn/ui. Includes authentication, beautiful UI components, and one-command dep…☆92Dec 16, 2024Updated last year
- Cybersecurity Internship Project☆112Jun 18, 2022Updated 3 years ago
- A simple asynchronous TCP/IP Connect Port Scanner in Python 3☆94Jun 23, 2023Updated 2 years ago
- Python for AWAE (Advanced Web Attacks and Exploitation)☆102Sep 5, 2023Updated 2 years ago
- ☆112May 12, 2023Updated 2 years ago
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated last week
- A version of openClaw/Clawdbot that automates android phones entirely without root, including all apps from a side-loaded APK. Acts as yo…☆373Updated this week
- CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled☆152Dec 9, 2025Updated 2 months ago
- This repository contain all virtual vulnerable machine. These vulnerable machine are Window and Linux based.☆128Jun 30, 2019Updated 6 years ago
- ☆330Dec 22, 2025Updated 2 months ago
- Tips for Penetration Testing☆138Aug 11, 2023Updated 2 years ago
- High-performance Redis library for Go☆147Nov 16, 2024Updated last year
- Just some random Red Team Scripts that can be useful☆153Jun 28, 2024Updated last year
- An awesome list of psychology courses, videos and books. Please, contribute!☆171Apr 13, 2019Updated 6 years ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆210Feb 7, 2026Updated 3 weeks ago
- This exention enables autocompletion within BurpSuite Repeater/Intruder tabs.☆164Mar 5, 2021Updated 5 years ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆189Aug 22, 2025Updated 6 months ago
- PNPT Exam Preparation - TCM Security☆171Jul 25, 2021Updated 4 years ago
- VenomRAT-HVNC 5.6, this is the latest version with a working HVNC module !☆169Dec 10, 2022Updated 3 years ago
- Automated rogue access point setup tool.☆204Apr 2, 2021Updated 4 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆252Mar 21, 2024Updated last year
- my notes☆249Feb 21, 2026Updated last week
- improving...☆256Oct 14, 2025Updated 4 months ago
- A curated list of awesome philosophy☆246Oct 26, 2019Updated 6 years ago