☆26Mar 23, 2026Updated 3 weeks ago
Alternatives and similar repositories for reptor
Users that are interested in reptor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆14May 15, 2024Updated last year
- A lightweight version of my bug bounty hunting framework designed to be run on Synack's LP+ machines.☆12Jul 11, 2023Updated 2 years ago
- FARO - Document Sensitivity Detector☆11Feb 8, 2021Updated 5 years ago
- Set of tools to audit and exploit STUN/TURN servers☆34Dec 12, 2025Updated 4 months ago
- ☆41Aug 25, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Lightweight, customizable enumeration script to aid in time-saving when participating in hacking labs or OSCP exam.☆32Feb 18, 2026Updated last month
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆29Jul 21, 2025Updated 8 months ago
- Config files for my GitHub profile.☆18Mar 21, 2026Updated 3 weeks ago
- A tool designed for penetration testers to perform attacks on LAN and WLAN networks, including network discovery, exploitation, and NAC b…☆45Jul 31, 2025Updated 8 months ago
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆40Jun 17, 2024Updated last year
- ☆10Jul 3, 2021Updated 4 years ago
- VBScript minifier☆25Apr 9, 2026Updated last week
- Fuzzing All Native Android System Services with Interface Awareness and Coverage☆39Sep 8, 2025Updated 7 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Plattform to develop and experiment with existing java web attacks.☆31Jan 8, 2018Updated 8 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- Files for the Wi-Fi duck workshop☆12Jan 26, 2020Updated 6 years ago
- a custom 7z, which can use three keys instead of password to extract zip file.☆13Oct 5, 2018Updated 7 years ago
- PHP Vulnerability Hunter (fork)☆12May 8, 2015Updated 10 years ago
- OpenAEV Docker deployment helpers☆28Apr 8, 2026Updated last week
- Automated Phishing Tool☆11May 27, 2020Updated 5 years ago
- A curated blocklist of Autonomous System Numbers (ASNs) associated with VPN providers, datacenters, and hosting services commonly used fo…☆17Mar 11, 2026Updated last month
- Scan git repos for secrets using regex and entropy 🔑☆10Jun 18, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Brutally optimizing guess-and-determine attacks https://www.usenix.org/conference/woot18/presentation/verstegen☆45Aug 13, 2018Updated 7 years ago
- Dynamic_RDS - Plugin for Falcon Player (FPP) to manage an FM transmitter and custom RDS (radio data system) messages similar to what is s…☆13Mar 1, 2026Updated last month
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆129Updated this week
- Detection scripts for MDM deployment to identify OpenClaw installations on managed devices.☆84Apr 7, 2026Updated last week
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Mar 12, 2026Updated last month
- Security scanner tool for Plone CMS.☆19May 14, 2012Updated 13 years ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Nov 30, 2025Updated 4 months ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆19Updated this week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆47May 20, 2025Updated 10 months ago
- ACVPatcher patches AndroidManifest and rewrites DEX files inside an APK not touching resources (unlike apktool)☆12Mar 1, 2026Updated last month
- Exploit Prediction Scoring System (EPSS)☆31Jun 1, 2022Updated 3 years ago
- SlideDecks from Meetups☆12Updated this week
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆16Jan 4, 2026Updated 3 months ago
- Icinga check plugin to check Prometheus☆20Mar 23, 2026Updated 3 weeks ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Aug 26, 2021Updated 4 years ago