☆55Apr 25, 2023Updated 2 years ago
Alternatives and similar repositories for IMDShift
Users that are interested in IMDShift are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embed…☆105Dec 8, 2025Updated 3 months ago
- ☆27Aug 18, 2023Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Jul 2, 2025Updated 8 months ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆17Jan 31, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆81Jul 25, 2025Updated 8 months ago
- wsnet☆26Mar 4, 2026Updated 3 weeks ago
- Expand IAM Actions with Wildcards☆35Mar 14, 2026Updated last week
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 4 months ago
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated last year
- ☆71Jan 8, 2025Updated last year
- Encoder PHP webshell to bypass WAF using XOR operations.☆55Aug 2, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆21Feb 22, 2023Updated 3 years ago
- find dangling domains in a multi cloud environment☆176Dec 25, 2025Updated 3 months ago
- CVE-2023-4634☆46Mar 14, 2026Updated last week
- Origin IP scanning utility developed with ChatGPT☆69Jun 21, 2023Updated 2 years ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- ☆30Jul 28, 2024Updated last year
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆18Mar 13, 2024Updated 2 years ago
- an exploit of Server-side request forgery (SSRF)☆53Aug 2, 2024Updated last year
- ☆124May 26, 2025Updated 9 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A tool for quickly evaluating IAM permissions in AWS.☆76May 27, 2024Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆69Aug 22, 2024Updated last year
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆61Feb 14, 2025Updated last year
- Creates needed resources for federating access between a GCP service account and AWS IAM role.☆30Apr 3, 2024Updated last year
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆132Sep 6, 2024Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- An automated script to extract hidden images from Tecno Camon X☆12Sep 23, 2023Updated 2 years ago
- ☆11May 1, 2024Updated last year
- BoltWire v6.03 vulnerable to "Improper Access Control"☆13Oct 31, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆83May 27, 2025Updated 9 months ago
- OWASP Domain Protect - prevent subdomain takeover☆397Dec 23, 2024Updated last year
- ☆36May 31, 2024Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆38Jun 15, 2023Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Apr 13, 2024Updated last year