LLM-based automated patch diffing
☆97Sep 15, 2025Updated 6 months ago
Alternatives and similar repositories for diffalayze
Users that are interested in diffalayze are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- ☆31Jul 26, 2024Updated last year
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆23Mar 2, 2022Updated 4 years ago
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year
- A slick, modern, privacy-focused web interface for viewing and analyzing Nuclei scan results. Built for pentesters & bug hunters who want…☆27Mar 31, 2025Updated 11 months ago
- Groovy Post Exploitation☆20Oct 21, 2024Updated last year
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated last month
- ☆17Jan 9, 2025Updated last year
- ☆33Jan 23, 2025Updated last year
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Telegram cli tool for bot notifications☆17Feb 24, 2021Updated 5 years ago
- ☆11Dec 22, 2023Updated 2 years ago
- ☆25Aug 17, 2022Updated 3 years ago
- ☆20Sep 6, 2023Updated 2 years ago
- urlyzer is a URL parsing analysis tool.☆24Jul 27, 2024Updated last year
- ☆20Apr 21, 2020Updated 5 years ago
- A terminal plugin to make Kali Linux objectively better - compatible with ohmyzsh☆18Jan 23, 2024Updated 2 years ago
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆62Aug 18, 2025Updated 7 months ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 7 months ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- Discover related domains using Whois data from whoxy.com☆15May 30, 2023Updated 2 years ago
- Lateral Movement Bof with MSI ODBC Driver Install☆148Sep 30, 2025Updated 5 months ago
- A lightweight version of my bug bounty hunting framework designed to be run on Synack's LP+ machines.☆12Jul 11, 2023Updated 2 years ago
- ☆12Oct 1, 2024Updated last year
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆66Nov 14, 2025Updated 4 months ago
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆43Dec 30, 2025Updated 2 months ago
- Caddy v2 module to filter requests based on C2 profiles☆46Apr 24, 2025Updated 11 months ago
- Manage and maintain Defender XDR custom collection configuration☆34Nov 19, 2025Updated 4 months ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- Collection of ProjectDiscovery wallpapers☆34Oct 31, 2023Updated 2 years ago
- An offensive toolkit for restless guests #DEFCON33☆53Aug 11, 2025Updated 7 months ago
- A cross platform library to write offensive and defensive security tools in Go☆131Dec 28, 2025Updated 2 months ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- Tool queries the OpenAI API to enhance the description, impact, and recommendation keys of a nuclei template.☆21Apr 1, 2023Updated 2 years ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- ☆37Feb 11, 2023Updated 3 years ago
- A simple, yet highly customizable, script to use with cloned websites for phishing and credentials harvesting☆20Nov 11, 2021Updated 4 years ago
- Direct access to NTFS volumes☆293Sep 9, 2025Updated 6 months ago