GoInspect identifies website technologies and checks for known vulnerabilities using the NVD API, providing CVE IDs, descriptions, and severity levels for enhanced security analysis and vulnerability assessment.
☆10Jan 22, 2025Updated last year
Alternatives and similar repositories for GoInspect
Users that are interested in GoInspect are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- URLs for Exploit (UFX) is a powerful, modular, and extensible tool designed for security researchers, penetration testers, and developers…☆17Jan 30, 2025Updated last year
- Slack Parser is a script to parse slack database and extract user-data, chat history, workspace information☆15Feb 21, 2021Updated 5 years ago
- Sneak past firewalls and exfiltrate data covertly. Encrypt your payload, disguise it as ICMP pings, and bypass network restrictions effor…☆24Apr 8, 2024Updated 2 years ago
- A curated list of awesome blockchain security resources☆33Dec 15, 2023Updated 2 years ago
- ☆20Mar 29, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Publications from Calif☆350Apr 28, 2026Updated last week
- HackLiners: CyberSec/BugHunting OneLiners☆62Oct 16, 2024Updated last year
- `vind` is a tool to create and manage a cluster of containers that look and work like virtual machines, on Docker.☆77Jul 29, 2025Updated 9 months ago
- A collection of resources for budding AI hackers☆24Jun 30, 2023Updated 2 years ago
- A JavaScript library to ruin someone’s day.☆88Aug 26, 2016Updated 9 years ago
- 🚀 Production-ready Next.js template with PocketBase and shadcn/ui. Includes authentication, beautiful UI components, and one-command dep…☆95Dec 16, 2024Updated last year
- Tool to find code cave in PE image (x86 / x64) - Find empty space to place code in PE files☆72Aug 1, 2023Updated 2 years ago
- High-performance Redis library for Go☆148Nov 16, 2024Updated last year
- Penetration Testing/Security Cheatsheets☆65Oct 31, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This repository is my own list of tools / useful stuff for pentest, defensive activities, programming, lockpicking and physical security☆63Dec 1, 2022Updated 3 years ago
- This exention enables autocompletion within BurpSuite Repeater/Intruder tabs.☆164Mar 5, 2021Updated 5 years ago
- ☆442Mar 4, 2026Updated 2 months ago
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆267Apr 19, 2026Updated 2 weeks ago
- ⚡️ Quick and easy searching tasks in one library.☆84Dec 12, 2025Updated 4 months ago
- A dynamic cheat sheet for PEN-200, OSCP, and other pentests made with Google Sheets☆86Jun 17, 2024Updated last year
- HackerToolkit offers a curated selection of tools designed to enhance your hacking capabilities. This repository not only organizes these…☆100May 14, 2024Updated last year
- LLM-based reversing for radare2☆424Apr 24, 2026Updated last week
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Python for AWAE (Advanced Web Attacks and Exploitation)☆104Sep 5, 2023Updated 2 years ago
- A simple asynchronous TCP/IP Connect Port Scanner in Python 3☆93Jun 23, 2023Updated 2 years ago
- Just some random Red Team Scripts that can be useful☆153Jun 28, 2024Updated last year
- A version of openClaw/Clawdbot that automates android phones entirely without root, including all apps from a side-loaded APK. Acts as yo…☆497Apr 21, 2026Updated 2 weeks ago
- This repository contain all virtual vulnerable machine. These vulnerable machine are Window and Linux based.☆133Jun 30, 2019Updated 6 years ago
- Cybersecurity Internship Project☆120Jun 18, 2022Updated 3 years ago
- Tips for Penetration Testing☆145Mar 26, 2026Updated last month
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆212Feb 7, 2026Updated 2 months ago
- CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled☆369Mar 9, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 40,000+ Nuclei templates for security scanning and detection across diverse web applications and services☆350Jan 7, 2024Updated 2 years ago
- An awesome list of psychology courses, videos and books. Please, contribute!☆174Apr 13, 2019Updated 7 years ago
- Automated rogue access point setup tool.☆204Apr 2, 2021Updated 5 years ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆199Apr 14, 2026Updated 3 weeks ago
- Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing☆405Jun 15, 2023Updated 2 years ago
- ⌨️ The never ending updates of my dotfiles config☆565Updated this week
- A curated list of resources for learning and exploring Triton, OpenAI's programming language for writing efficient GPU code.☆481Mar 10, 2025Updated last year