The Dependency Confusion vulnerability scanner and autoexploitation tool to help identifying and mitigating supply chain attacks
☆37Feb 20, 2024Updated 2 years ago
Alternatives and similar repositories for Loki
Users that are interested in Loki are comparing it to the libraries listed below
Sorting:
- Dnslog Interactsh的Py版接口查询☆13Dec 10, 2021Updated 4 years ago
- ☆17Oct 9, 2024Updated last year
- Find orphaned IP's on cloud services☆29Oct 23, 2019Updated 6 years ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆14Jul 3, 2025Updated 8 months ago
- 🌐🔍 Red Network Tool is a tool for network exploration and info finding.☆41Mar 26, 2022Updated 3 years ago
- ☆21Aug 3, 2022Updated 3 years ago
- ☆29Feb 4, 2026Updated 3 weeks ago
- ☆24Aug 9, 2022Updated 3 years ago
- Facebook Write-ups, PoC, and exploitation codes:☆29Jan 20, 2020Updated 6 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Aug 6, 2021Updated 4 years ago
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆32Nov 4, 2022Updated 3 years ago
- Host Header Vulnerability Scanner Automated Tool☆28Apr 18, 2025Updated 10 months ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Jul 21, 2024Updated last year
- Descripción del perfil☆11May 27, 2024Updated last year
- ☆15Mar 21, 2025Updated 11 months ago
- Generate Emails for a company/website from a given list of names.☆31Oct 16, 2022Updated 3 years ago
- The list of files through which we can pop-up the java script alert box☆40Mar 5, 2018Updated 7 years ago
- PowerShell alternative/restriction bypass☆11Apr 6, 2025Updated 10 months ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- This script checks the status of URLs to see if they are alive or not.☆13Nov 22, 2024Updated last year
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- Práctica 2 del Taller de Git y GitHub de 42 Málaga☆12Oct 10, 2024Updated last year
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ☆28Jan 19, 2026Updated last month
- 💋 My Github Profile Readme☆11Jul 29, 2022Updated 3 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆43Jun 28, 2022Updated 3 years ago
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated 2 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated last week
- Python utility to takeover domains vulnerable to AWS NS Takeover☆86Feb 2, 2023Updated 3 years ago
- FCracker is a command line tool designed to brute force encrypted files like zip, 7z, rar, pdf etc.☆36Mar 25, 2021Updated 4 years ago
- ☆42Apr 18, 2023Updated 2 years ago
- ☆46Nov 5, 2025Updated 3 months ago