☆20Dec 29, 2015Updated 10 years ago
Alternatives and similar repositories for directory
Users that are interested in directory are comparing it to the libraries listed below
Sorting:
- ☆22Mar 2, 2016Updated 10 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Project "Flashbang" - An open-source Flash-security helper☆205Apr 19, 2015Updated 10 years ago
- It's like DocBleach, but in your browser☆18Oct 24, 2019Updated 6 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆123Apr 4, 2018Updated 7 years ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Oct 30, 2019Updated 6 years ago
- Actarus is a custom tool for bug bounty☆77Nov 14, 2019Updated 6 years ago
- Monitor an ECS Deployment☆16Feb 28, 2026Updated 3 weeks ago
- A simple menu system for the Adafruit PiTFT for Raspberry Pi☆11Nov 23, 2016Updated 9 years ago
- ☆13Apr 30, 2016Updated 9 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 8 years ago
- Adama - Command and Invoker Pattern For Getting Things Done☆13Aug 10, 2023Updated 2 years ago
- Detect passive activity in the Tor-network☆13May 11, 2015Updated 10 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- Check for .net padding oracle patch☆19Oct 4, 2018Updated 7 years ago
- An implementation of the hashcat rules engine in javascript☆49Feb 17, 2018Updated 8 years ago
- Simple Webshell Scanner☆55Jan 11, 2015Updated 11 years ago
- Bypass XSS Reflected Cross-site scripting☆33Oct 15, 2015Updated 10 years ago
- Web-based Source Code Vulnerability Scanner☆21Jul 8, 2016Updated 9 years ago
- Setup script for Regon-ng☆938Nov 17, 2020Updated 5 years ago
- Faraday Continuous Scanning☆34Sep 29, 2016Updated 9 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Dec 11, 2015Updated 10 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆260Aug 22, 2021Updated 4 years ago
- ☆44Aug 9, 2017Updated 8 years ago
- A simple threaded Python script that returns the authentication methods supported by each of a list of SSH servers..☆12Jul 29, 2015Updated 10 years ago
- Download Flickr photos without API key.☆22Sep 21, 2021Updated 4 years ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Sep 19, 2019Updated 6 years ago
- PoC for an adaptive parallelised DNS prober☆109Oct 4, 2022Updated 3 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- Cross platform (i.e., Windows, Linux, Mac) assessment script. The script helps assess workstations for vulnerabilities and abnormalities.☆19Aug 14, 2015Updated 10 years ago
- ☆11Aug 11, 2015Updated 10 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆20Jul 22, 2016Updated 9 years ago
- Create a stream from one or more memory regions.☆12Jan 22, 2024Updated 2 years ago
- Web interface for recon-ng☆14Nov 22, 2015Updated 10 years ago
- Lightweight static site generator in PHP without a database.☆17Sep 15, 2015Updated 10 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆278Feb 12, 2021Updated 5 years ago
- TSLint rules for Angular☆18Nov 30, 2018Updated 7 years ago