☆20Jul 19, 2021Updated 4 years ago
Alternatives and similar repositories for monolith
Users that are interested in monolith are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Gmail shell, for hackers execute commands via gmail☆20Feb 3, 2021Updated 5 years ago
- Cisco CallManager User Enumeration☆16Aug 16, 2022Updated 3 years ago
- Template Injection in Email Templates leads to code execution on Jira Service Management Server☆48Sep 9, 2021Updated 4 years ago
- CVE-2021-22192☆13Apr 28, 2021Updated 5 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆23Feb 11, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Mar 2, 2022Updated 4 years ago
- httpscan implements by Go☆22Apr 1, 2021Updated 5 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 6 years ago
- Code go audit tool with ai☆23Jan 13, 2025Updated last year
- Pentest-Command☆20Nov 10, 2021Updated 4 years ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 10 months ago
- ☆24Oct 31, 2023Updated 2 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆27Apr 1, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆25Jun 15, 2025Updated 10 months ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 8 years ago
- Tools for fast matched Ex0 pattern in huge log files☆26Sep 30, 2022Updated 3 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- Burp Extension for a passive scanning JS files for endpoint links.☆56Nov 20, 2024Updated last year
- Looks for parameters in urls☆34Oct 14, 2024Updated last year
- Proof-of-concept CORS exploitation tool.☆35Sep 7, 2019Updated 6 years ago
- 基于BurpShiroPassiveScan修改增加了Xray回显链生成☆56Sep 6, 2022Updated 3 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- ☆16Oct 24, 2018Updated 7 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆35May 24, 2024Updated last year
- This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-2…☆33Oct 24, 2023Updated 2 years ago
- ☆102May 5, 2020Updated 5 years ago
- Burpsuite Extension for Jsmon☆23Apr 6, 2026Updated 3 weeks ago
- Custom / Experimental CodeQL queries☆37Apr 21, 2022Updated 4 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- wallhack for cs:go game☆11Jul 7, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- 字节码工具☆31Sep 19, 2022Updated 3 years ago
- A code security platform based on fortify sca windows☆15Mar 6, 2019Updated 7 years ago
- burp插件开发笔记☆11Dec 26, 2021Updated 4 years ago
- a short, AI-powered python script to look for all the naughty words you've ever used on twitter.com (best if used before you wreck yoself…☆13Apr 15, 2020Updated 6 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 13 years ago