Cipher Suite Checker
☆12Mar 22, 2023Updated 2 years ago
Alternatives and similar repositories for WhatTheCipher
Users that are interested in WhatTheCipher are comparing it to the libraries listed below
Sorting:
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- Cross Injector — A Python Script for Cross-Site Scripting (XSS) Detection☆40Sep 3, 2025Updated 6 months ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆41Aug 23, 2024Updated last year
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- Bypassing File Upload Restriction using Magic Bytes☆22Jul 4, 2022Updated 3 years ago
- A small tool to find admin panel of the website☆20Nov 21, 2022Updated 3 years ago
- Generate a cross join, also known as a Cartesian product, from the lines of the specified files. This process is useful for creating fuzz…☆21Jun 29, 2023Updated 2 years ago
- ThreatTracer - A tool to identify CVE by name & version and more by @FR13ND0x7F☆145Feb 20, 2026Updated 2 weeks ago
- scripts☆10Aug 25, 2023Updated 2 years ago
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- ☆11Sep 15, 2024Updated last year
- Inside403 is a powerful and versatile web security testing tool designed to assess the robustness of web pages and directories against 40…☆31Aug 30, 2023Updated 2 years ago
- Quick and dirty script to check for No RL☆31Feb 18, 2025Updated last year
- ☆18May 11, 2021Updated 4 years ago
- Hardware specifications and schematics for the Worldcoin Orb.☆10Jul 18, 2023Updated 2 years ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- Collection of mine and others presentations on various topics like application security, python, cloud security, DevSecOps and so on... T…☆43Mar 24, 2025Updated 11 months ago
- Repository for the Oulu University Security Engineering course.☆14Sep 12, 2025Updated 5 months ago
- ☆10Mar 11, 2024Updated last year
- A postman collection for exploring the Mollie API☆14Oct 8, 2024Updated last year
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.☆13Jul 2, 2025Updated 8 months ago
- ☆11Nov 22, 2021Updated 4 years ago
- black Ip lists, dorks-collection☆16Updated this week
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 6 months ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Nov 23, 2021Updated 4 years ago
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- VPN & IP Changer☆10Aug 6, 2024Updated last year
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆11Aug 27, 2022Updated 3 years ago
- Add your configs for tmux☆18Apr 3, 2022Updated 3 years ago
- A tool to easily generate docker swarm stacks☆14Sep 20, 2025Updated 5 months ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- Inspecting the Moto Audio application running on Motorola Android devices☆10Aug 28, 2021Updated 4 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- The course cryptographic systems and their weaknesses in the University of Oulu☆10Feb 26, 2026Updated last week