☆94Aug 17, 2020Updated 5 years ago
Alternatives and similar repositories for 4CAN
Users that are interested in 4CAN are comparing it to the libraries listed below
Sorting:
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- Security analysis toolkit for proprietary car protocols☆785Feb 21, 2022Updated 4 years ago
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- Toolkit for implant attack of IoT devices☆137Sep 6, 2018Updated 7 years ago
- ☆14Aug 27, 2025Updated 6 months ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆112Oct 11, 2018Updated 7 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆249Sep 9, 2021Updated 4 years ago
- Essential tool for finding blind injection attacks.☆50Feb 6, 2019Updated 7 years ago
- Operational Security utility and automator.☆142Jul 21, 2020Updated 5 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- SDK-SMS-Stack☆28Jan 4, 2023Updated 3 years ago
- Get clients and access points.☆48Aug 28, 2019Updated 6 years ago
- A standalone addon for GnuPG☆18Nov 25, 2018Updated 7 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆123Apr 13, 2019Updated 6 years ago
- NodeXP - A Server Side Javascript Injection tool capable of detecting and exploiting Node.js vulnerabilities☆108Jan 31, 2025Updated last year
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆536Mar 27, 2022Updated 3 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Jan 16, 2020Updated 6 years ago
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆83Feb 17, 2026Updated last week
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 4 months ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Multi-Purpose DNS Server☆144Jun 4, 2025Updated 8 months ago
- Car Backdoor Maker☆220Oct 1, 2018Updated 7 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Jan 7, 2020Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- Open source all-in-one CLI tool to semi-automate pentesting.☆165May 21, 2020Updated 5 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 5 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆26Oct 25, 2020Updated 5 years ago
- Pentest Scripts for Apache Vulnerabilities☆30Jan 30, 2018Updated 8 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 7 months ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago