☆20Jul 19, 2021Updated 4 years ago
Alternatives and similar repositories for monolith
Users that are interested in monolith are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Dec 31, 2021Updated 4 years ago
- Cisco CallManager User Enumeration☆16Aug 16, 2022Updated 3 years ago
- Get tweets and save file in JSON format without Twitter API☆11Jan 1, 2019Updated 7 years ago
- Template Injection in Email Templates leads to code execution on Jira Service Management Server☆48Sep 9, 2021Updated 4 years ago
- CVE-2021-22192☆13Apr 28, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PostScript examples useful for attacking Ghostscript.☆12Aug 1, 2024Updated last year
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- A tool designed to correlate evidence obtained from IoT devices☆11Nov 6, 2020Updated 5 years ago
- Code go audit tool with ai☆23Jan 13, 2025Updated last year
- Adobe Experience Manager (AEM) hacking toolkit☆111Sep 26, 2025Updated 6 months ago
- Pentest-Command☆20Nov 10, 2021Updated 4 years ago
- ☆24Oct 31, 2023Updated 2 years ago
- Grafana Arbitrary File Reading Vulnerability☆27Dec 7, 2021Updated 4 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆27Apr 1, 2026Updated last week
- ☆25Jun 15, 2025Updated 9 months ago
- my goto docker image when playing ctfs with all the tools I need☆21Apr 3, 2026Updated last week
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- Tools for fast matched Ex0 pattern in huge log files☆26Sep 30, 2022Updated 3 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- Burp Extension for a passive scanning JS files for endpoint links.☆56Nov 20, 2024Updated last year
- Proof-of-concept CORS exploitation tool.☆35Sep 7, 2019Updated 6 years ago
- 基于BurpShiroPassiveScan修改增加了Xray回显链生成☆56Sep 6, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆22Apr 12, 2023Updated 3 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆31Updated this week
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆86Feb 21, 2023Updated 3 years ago
- 🏄♂️ Decode and analyze protobuf efficiently.☆138Oct 2, 2024Updated last year
- ☆16Oct 24, 2018Updated 7 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆35May 24, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Burpsuite Extension for Jsmon☆23Apr 6, 2026Updated last week
- Custom / Experimental CodeQL queries☆37Apr 21, 2022Updated 3 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- 字节码工具☆31Sep 19, 2022Updated 3 years ago
- burp插件开发笔记☆11Dec 26, 2021Updated 4 years ago
- a short, AI-powered python script to look for all the naughty words you've ever used on twitter.com (best if used before you wreck yoself…☆13Apr 15, 2020Updated 6 years ago
- 一款用于JNDI注入利用的工具,大量参考/引用了Rogue JNDI项目的代码,支持直接植入内存shell,并集成了常见的bypass 高版本JDK的方式,适用于与自动化工具配合使用。☆30Oct 25, 2021Updated 4 years ago