Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.
☆65Nov 12, 2025Updated 5 months ago
Alternatives and similar repositories for exposor
Users that are interested in exposor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆76Sep 6, 2024Updated last year
- The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.☆194Nov 26, 2024Updated last year
- Discover and monitor internet assets using favicon hashes across search engines.☆248Oct 11, 2025Updated 6 months ago
- Repo for hosting rayder workflows☆63Aug 31, 2023Updated 2 years ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Security Blogs - A simple aggregator for security news/blog☆25Mar 31, 2026Updated 2 weeks ago
- ☆18Feb 29, 2024Updated 2 years ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Jun 10, 2025Updated 10 months ago
- Find your hash in online databases and retrieve its original value☆17Sep 22, 2023Updated 2 years ago
- A Multilayered AV/EDR Evasion Framework and AV Testing Tool.☆18Jun 28, 2025Updated 9 months ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- CLI tool for fetching URLs from Wayback Machine, Common Crawl, and VirusTotal.☆40Aug 21, 2025Updated 7 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆104Apr 11, 2025Updated last year
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆40Nov 20, 2025Updated 4 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- masscan with exclusive excludes☆58Nov 8, 2023Updated 2 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 8 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84May 17, 2025Updated 10 months ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- InfraGuard is a Command & Control Redirection Proxy and Manager which protects your Red Team Infrastructure against threat attribution☆133Apr 6, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A MBR Fuzzer☆31Apr 3, 2024Updated 2 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Analysis of the Enterprise SAST/DAST product landscape☆38Feb 28, 2024Updated 2 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Jun 30, 2019Updated 6 years ago
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆29Sep 23, 2025Updated 6 months ago
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆141Dec 7, 2024Updated last year
- ☆23Jun 28, 2025Updated 9 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆52Mar 7, 2025Updated last year
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Repo hacks☆21Dec 7, 2025Updated 4 months ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Mar 29, 2026Updated 2 weeks ago
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆132Mar 3, 2026Updated last month
- Modern PIC implant for Windows (64 & 32 bit)☆107Jul 23, 2025Updated 8 months ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 3 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆29Nov 30, 2025Updated 4 months ago