Dependency Combobulator
☆95Jan 10, 2024Updated 2 years ago
Alternatives and similar repositories for combobulator
Users that are interested in combobulator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆143Feb 24, 2025Updated last year
- ☆89Feb 11, 2022Updated 4 years ago
- Place for random PoCs☆18May 21, 2020Updated 5 years ago
- Grammar-based HTTP/1 fuzzer with mutation ability☆262Oct 30, 2024Updated last year
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Jan 4, 2026Updated 2 months ago
- Experiments on the Windows Internals☆31Sep 22, 2019Updated 6 years ago
- client-side prototype pullution vulnerability scanner☆46Aug 23, 2021Updated 4 years ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- A Developer and Security Engineer friendly package for Securing NodeJS Applications.☆28Nov 14, 2022Updated 3 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Mar 1, 2023Updated 3 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Aug 6, 2021Updated 4 years ago
- Burp Extension for AWS Signing☆92Jan 10, 2025Updated last year
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- ☆58Mar 16, 2026Updated last week
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- ☆12Oct 17, 2023Updated 2 years ago
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- Jumpstart multiple WebSocket servers quickly☆32Nov 23, 2021Updated 4 years ago
- [W.I.P] An ecosystem of crawlers for detecting: leaks, sensitive data exposure and attempts exfiltration of data☆32Mar 16, 2026Updated last week
- Collection of CobaltStrike beacon object files☆105Feb 14, 2022Updated 4 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆41Aug 16, 2022Updated 3 years ago
- Differential Fuzzer to hunt for logic bugs on Perl Modules☆26Updated this week
- egrets monitors egress☆47Apr 12, 2020Updated 5 years ago
- POC for .NET mssql client for accessing database data through beacon☆64Sep 12, 2023Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- A lightweight static security analysis tool for modern Perl Apps☆56Mar 16, 2026Updated last week
- Prevent merging of malicious code in pull requests☆253Jan 8, 2026Updated 2 months ago
- Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron appli…☆31Jan 13, 2026Updated 2 months ago
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,012Mar 11, 2026Updated last week