The Dependency Confusion vulnerability scanner and autoexploitation tool to help identifying and mitigating supply chain attacks
☆37Feb 20, 2024Updated 2 years ago
Alternatives and similar repositories for Loki
Users that are interested in Loki are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dnslog Interactsh的Py版接口查询☆13Dec 10, 2021Updated 4 years ago
- ☆17Oct 9, 2024Updated last year
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆14Jul 3, 2025Updated 8 months ago
- 🌐🔍 Red Network Tool is a tool for network exploration and info finding.☆41Mar 26, 2022Updated 3 years ago
- Find orphaned IP's on cloud services☆29Oct 23, 2019Updated 6 years ago
- ☆29Feb 4, 2026Updated last month
- ☆15Mar 21, 2025Updated last year
- Grep subdomains from web pages.☆42Feb 10, 2025Updated last year
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆32Nov 4, 2022Updated 3 years ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated last month
- Host Header Vulnerability Scanner Automated Tool☆28Apr 18, 2025Updated 11 months ago
- Fetch Javascript sourcemaps, bounty hunter style☆42May 21, 2023Updated 2 years ago
- CVE-2022-3910☆12Mar 14, 2023Updated 3 years ago
- This repository is about Learn | Hack | Share | Repeat.☆11Dec 26, 2022Updated 3 years ago
- ☆24Aug 9, 2022Updated 3 years ago
- ☆13Nov 3, 2023Updated 2 years ago
- Chan-vy é um script que baixa o código-fonte de todas as ferramentas disponíveis no Kali Linux, direto dos seus repositórios oficiais e d…☆12Feb 5, 2024Updated 2 years ago
- Generate Emails for a company/website from a given list of names.☆31Oct 16, 2022Updated 3 years ago
- Utility to pull disclosed vulnerabilities from HackerOne private programs - for personal use only☆13Aug 22, 2021Updated 4 years ago
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- Evil Twin Attack Bash script☆12Feb 21, 2016Updated 10 years ago
- RabbitMQ exploit and Pentesting guide for penetration tester☆20Nov 22, 2023Updated 2 years ago
- Facebook Write-ups, PoC, and exploitation codes:☆30Jan 20, 2020Updated 6 years ago
- JSBerg is a fast and efficient URL scraper that extracts links, JavaScript files, CSS files, images, and inline URLs from a list of websi…☆23Mar 19, 2025Updated last year
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆16Mar 20, 2023Updated 3 years ago
- 🔍 Improve your files enumeration with specific extensions!☆17Jan 11, 2022Updated 4 years ago
- A collection of in-depth studies authored by me on JavaScript engine vulnerabilities.☆50Feb 6, 2026Updated last month
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Enhanced, Faster, Better version of the exploit☆25Dec 27, 2025Updated 2 months ago
- ☆16May 3, 2021Updated 4 years ago
- ☆21Aug 3, 2022Updated 3 years ago
- WebSocket shell☆14Nov 29, 2020Updated 5 years ago
- This project deals with vulnerability analysis and classification using machine learning techniques i.e. Natural Language Processing.☆10Feb 21, 2019Updated 7 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- Python utility to takeover domains vulnerable to AWS NS Takeover☆86Feb 2, 2023Updated 3 years ago
- ☆29Jan 19, 2026Updated 2 months ago
- a WebSocket cat.☆14Aug 5, 2017Updated 8 years ago
- This script checks the status of URLs to see if they are alive or not.☆13Nov 22, 2024Updated last year
- A MCP Server that provides browser access through playwright with "stealth mode" enabled.☆21Jun 29, 2025Updated 8 months ago