Unified Vulnerability Intelligence Platform
☆64Dec 21, 2025Updated 2 months ago
Alternatives and similar repositories for fluxion
Users that are interested in fluxion are comparing it to the libraries listed below
Sorting:
- LLMON 🍋 - The World's First Web Adversarial AI Firewall☆40Jan 3, 2026Updated 2 months ago
- AI Substitutor is an extension for Burp Suite that uses AI functionality to substitute values of HTTP request parameters and headers.☆27Apr 30, 2025Updated 10 months ago
- Automated Recon Framework☆24Oct 3, 2020Updated 5 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆35Jan 18, 2026Updated last month
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆99Dec 23, 2025Updated 2 months ago
- Ping Legacy gives a legacy experience to test ping to get connection status and quality to network or internet.☆20Feb 19, 2026Updated 2 weeks ago
- ☆11Jun 21, 2023Updated 2 years ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆23Dec 28, 2025Updated 2 months ago
- Convert excel sheet to SEO friendly sitemaps!☆12Dec 8, 2022Updated 3 years ago
- 一款支持检测web应用程序未授权访问缺陷的burp suite插件,可自定义配置检测字段以及返回包json数据分析☆12Apr 22, 2024Updated last year
- CScan 是一个基于Go语言开发的网络空间资产搜索工具,支持多个主流网络空间搜索引擎:FOFA Hunter Quake,能够快速搜索IP、域名等资产信息。☆42Jan 16, 2025Updated last year
- Microsoft Network Service Fingerprinting Tool☆69Jan 2, 2026Updated 2 months ago
- Interact with standup reports and poll results directly from Claude or Cursor☆18Feb 25, 2026Updated last week
- A collection of prompts is used to boost software development.☆15Jun 13, 2025Updated 8 months ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- This is the public repo for Sentinel Group's Sentrix which is a Service on the Sentinel Service Chain and utilizes the Matrix Server to d…☆11Apr 30, 2018Updated 7 years ago
- 为初学者开发的爆破靶场。☆29Nov 28, 2025Updated 3 months ago
- OpenVPN Install Script☆13Dec 31, 2022Updated 3 years ago
- A prompt-based pipeline for finding, validating, and proving vulnerabilities using LLM sub-agents.☆41Feb 22, 2026Updated last week
- Iot BeeHive Monitoring using Balena.io☆12Mar 7, 2022Updated 3 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- Command line pastebin for sharing terminal output.☆11Jul 29, 2021Updated 4 years ago
- Multi-node monitor / manager for Pocket Network Validator nodes☆10Dec 9, 2020Updated 5 years ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- A FullC2 Framework TUI + Web UI That Focuses On Network Stressing☆14Aug 24, 2025Updated 6 months ago
- ☆14Sep 2, 2013Updated 12 years ago
- serverless app for sharing one-time secrets☆10Jan 6, 2023Updated 3 years ago
- Custom rule set for spamassassin☆10Aug 9, 2019Updated 6 years ago
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 2 years ago
- Hack garage remote controls using HackRF One and GNU Radio☆12Dec 22, 2023Updated 2 years ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- Serverless Workshop SvelteKit Example☆11Sep 24, 2022Updated 3 years ago
- Use Twig template engine instead of plain-php templates in ProcessWire☆15Oct 11, 2017Updated 8 years ago
- Scanner for misconfigured DevSecOps or Security tools on internet like SonarQube, GoPhish etc.☆12Apr 4, 2025Updated 11 months ago
- 个人渗透测试常用加解密算法实现。☆12May 18, 2023Updated 2 years ago
- A golang script for self-updating list of the latest and most common useragents seen on the web across all device types, operating system…☆10Jan 15, 2024Updated 2 years ago
- View multiple App Store products from within an iOS app☆42Aug 5, 2025Updated 7 months ago
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆15May 5, 2025Updated 10 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 3 weeks ago