Proxy Management for Security Professionals
☆24Mar 25, 2025Updated 11 months ago
Alternatives and similar repositories for ProxSec
Users that are interested in ProxSec are comparing it to the libraries listed below
Sorting:
- Get list of subsidiaries for a selected company☆32Dec 21, 2024Updated last year
- ☆13Oct 24, 2024Updated last year
- Extract endpoints from source files.☆25Mar 28, 2023Updated 2 years ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Feb 22, 2025Updated last year
- Find subdomains on GitLab.☆107Apr 28, 2024Updated last year
- ☆28Jul 5, 2023Updated 2 years ago
- Analyze Content-Security-Policy header of a given URL.☆33Jan 10, 2024Updated 2 years ago
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- A script used to query the dehashed API and filter for more useful results☆16Jun 20, 2021Updated 4 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- API-Pentesting-Checklist☆25Feb 27, 2023Updated 3 years ago
- A curated atelier for security research. Deciphering the anatomy of risk through a disciplined and reproducible toolkit.☆13Feb 17, 2026Updated last month
- gRPC Goat is a "Vulnerable by Design" lab created to provide an interactive, hands-on playground for learning and practicing gRPC securit…☆51Sep 22, 2025Updated 5 months ago
- Python script implementing the favicon hash trick to find subdomains.☆39Mar 28, 2023Updated 2 years ago
- Script to make your Gnome desktop environment look like MacOS☆10Nov 2, 2020Updated 5 years ago
- linux for humans☆14Jul 18, 2018Updated 7 years ago
- A Mixture‑of‑Experts Educational Framework for Adaptive Cybersecurity☆22Feb 8, 2026Updated last month
- Like DLP☆11Jan 27, 2025Updated last year
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆125Dec 17, 2024Updated last year
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 5 months ago
- My arch linux setup and beyond☆15Mar 10, 2026Updated last week
- Extract data from a .git directory.☆15Mar 28, 2023Updated 2 years ago
- A tutorial on how to train RNN-T from scratch with Whisper encoder☆12Mar 11, 2025Updated last year
- ☆16Nov 26, 2024Updated last year
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- A Kali-based docker container pre-built with tools, ZSH, and SSH.☆14Nov 22, 2024Updated last year
- ☆245Mar 13, 2025Updated last year
- Recon Automation☆11Sep 14, 2024Updated last year
- ☆13Nov 3, 2023Updated 2 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- CrabCrypt is a secure file encryption tool with GUI, designed for effortlessly encrypting and decrypting any file. With AES encryption an…☆24Mar 17, 2025Updated last year
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Welcome to my GitHub repository housing comprehensive handwritten notes from the IBM Cybersecurity Analyst Professional certification. Di…☆23Feb 27, 2024Updated 2 years ago
- ☆113Apr 25, 2023Updated 2 years ago
- Spec files and code to use for AWS CodeCommit, CodeDeploy, and CodePipeline☆10Apr 16, 2021Updated 4 years ago
- Image encryption based on chaos maps in python☆13Apr 30, 2020Updated 5 years ago
- Obtain information about network hosts☆23Jul 25, 2024Updated last year
- Wayfiles is a tool designed to search for juicy files and URLs within a folder/file with results of tools like gau, waymore, waybackurls,…☆16Feb 22, 2026Updated 3 weeks ago
- API research and learning☆12May 22, 2019Updated 6 years ago