TheDreamPort / deep_exploit
☆70Updated 2 years ago
Alternatives and similar repositories for deep_exploit
Users that are interested in deep_exploit are comparing it to the libraries listed below
Sorting:
- Pentest AI utilizes machine learning to fully automate penetration testing and exploitation for assessing port, web, and application secu…☆64Updated 9 months ago
- LLM Powered Pentesting for your software☆109Updated last year
- An Interface for AI built for cybersecurity professionals☆91Updated 2 months ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆135Updated 7 months ago
- Prompt Injections Everywhere☆120Updated 9 months ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆34Updated 2 months ago
- The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.☆182Updated 5 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 8 months ago
- AI-powered cybersecurity chatbot designed to provide helpful and accurate answers to your cybersecurity-related queries and also do code …☆303Updated 6 months ago
- ☆42Updated 3 months ago
- A fast subdomain takeover tool☆80Updated last year
- 🕵️ Email osint tool☆62Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 8 months ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆295Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆135Updated last month
- ☆231Updated 10 months ago
- A tool for Oragnized ASM (Attack Surface Mapper). Subdomains enumeration, IPs scans, Vulnerability assesment...☆37Updated last year
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 9 months ago
- ☆162Updated 6 months ago
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆56Updated last month
- AI Powered Terminal Based Ethical Hacking Assistant☆66Updated 3 months ago
- PIP-INTEL is an OSINT (Open Source Intelligence) tool designed using various open-source tools and pip packages.☆156Updated last year
- A LLM explicitly designed for getting hacked☆149Updated last year
- ☆119Updated last year
- Discovering Typo Squatting on your domains!☆68Updated 9 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆51Updated 4 months ago
- ☆17Updated 10 months ago
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆148Updated 5 months ago
- HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network ca…☆57Updated last week
- List Of Ransomware Groups Official WebSites☆65Updated last month