Proxy Management for Security Professionals
☆25Mar 25, 2025Updated last year
Alternatives and similar repositories for ProxSec
Users that are interested in ProxSec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Get list of subsidiaries for a selected company☆32Dec 21, 2024Updated last year
- ☆13Oct 24, 2024Updated last year
- Extract endpoints from source files.☆25Mar 28, 2023Updated 3 years ago
- BSCIT Network Security Notes☆11Oct 1, 2018Updated 7 years ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Feb 22, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Find subdomains on GitLab.☆108Apr 28, 2024Updated 2 years ago
- ☆30Jul 5, 2023Updated 2 years ago
- Analyze Content-Security-Policy header of a given URL.☆33Jan 10, 2024Updated 2 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆22May 27, 2025Updated 11 months ago
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- A script used to query the dehashed API and filter for more useful results☆16Jun 20, 2021Updated 4 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- API-Pentesting-Checklist☆25Feb 27, 2023Updated 3 years ago
- A curated atelier for security research. Deciphering the anatomy of risk through a disciplined and reproducible toolkit.☆13Feb 17, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Python script implementing the favicon hash trick to find subdomains.☆40Mar 28, 2023Updated 3 years ago
- gRPC Goat is a "Vulnerable by Design" lab created to provide an interactive, hands-on playground for learning and practicing gRPC securit…☆51Sep 22, 2025Updated 7 months ago
- Sweet theme for Sweet Hackers 💚☆41Feb 1, 2025Updated last year
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆14Aug 8, 2024Updated last year
- ☆53Oct 1, 2025Updated 6 months ago
- Like DLP☆11Jan 27, 2025Updated last year
- linux for humans☆14Jul 18, 2018Updated 7 years ago
- A Mixture‑of‑Experts Educational Framework for Adaptive Cybersecurity☆22Feb 8, 2026Updated 2 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆126Dec 17, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 6 months ago
- Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. B…☆19Apr 30, 2025Updated last year
- Dự án nghiên cứu khai thác modem VNPT các dòng H, NS, XS: phân tích firmware, UART, root shell, mở telnet/ssh và tùy chỉnh cấu hình☆36Apr 22, 2026Updated last week
- My arch linux setup and beyond☆16Apr 17, 2026Updated last week
- Extract data from a .git directory.☆15Mar 28, 2023Updated 3 years ago
- ☆16Nov 26, 2024Updated last year
- Script to make your Gnome desktop environment look like MacOS☆11Nov 2, 2020Updated 5 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- A Kali-based docker container pre-built with tools, ZSH, and SSH.☆14Nov 22, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Guide for how to set up an Android tablet as a useful computing device with a Linux desktop.☆18Oct 15, 2021Updated 4 years ago
- ☆249Mar 13, 2025Updated last year
- Recon Automation☆11Sep 14, 2024Updated last year
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Schedule HTTP jobs dynamically : per user, per event, without building your own scheduler.☆31Apr 5, 2026Updated 3 weeks ago
- A stealthy, fast and easy tool to spray Active Directory credentials and bypass AD credential spraying controls.☆13Oct 13, 2022Updated 3 years ago