☆20Dec 29, 2015Updated 10 years ago
Alternatives and similar repositories for directory
Users that are interested in directory are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Mar 2, 2016Updated 10 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Project "Flashbang" - An open-source Flash-security helper☆205Apr 19, 2015Updated 11 years ago
- It's like DocBleach, but in your browser☆18Oct 24, 2019Updated 6 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆124Apr 4, 2018Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tools☆13Apr 20, 2023Updated 3 years ago
- Actarus is a custom tool for bug bounty☆77Nov 14, 2019Updated 6 years ago
- Quickly add disruptive unicode, dangerous strings, and more to your clipboard.☆26Mar 14, 2016Updated 10 years ago
- Ruby library for interacting with Bugcrowd's VRT☆14Mar 6, 2026Updated last month
- Monitor an ECS Deployment☆16Feb 28, 2026Updated 2 months ago
- ☆13Apr 30, 2016Updated 10 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Jun 13, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Adama - Command and Invoker Pattern For Getting Things Done☆13Aug 10, 2023Updated 2 years ago
- Detect passive activity in the Tor-network☆13May 11, 2015Updated 10 years ago
- Simple Webshell Scanner☆55Jan 11, 2015Updated 11 years ago
- Bypass XSS Reflected Cross-site scripting☆33Oct 15, 2015Updated 10 years ago
- Web-based Source Code Vulnerability Scanner☆21Jul 8, 2016Updated 9 years ago
- Setup script for Regon-ng☆939Nov 17, 2020Updated 5 years ago
- Faraday Continuous Scanning☆34Sep 29, 2016Updated 9 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Dec 11, 2015Updated 10 years ago
- ☆44Aug 9, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Download Flickr photos without API key.☆22Sep 21, 2021Updated 4 years ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Sep 19, 2019Updated 6 years ago
- PoC for an adaptive parallelised DNS prober☆109Oct 4, 2022Updated 3 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 9 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 13 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆20Jul 22, 2016Updated 9 years ago
- sniff inputs type☆10Aug 3, 2017Updated 8 years ago
- Create a stream from one or more memory regions.☆12Jan 22, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Web interface for recon-ng☆14Nov 22, 2015Updated 10 years ago
- Android Testing☆16Mar 24, 2014Updated 12 years ago
- Lightweight static site generator in PHP without a database.☆17Sep 15, 2015Updated 10 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆277Feb 12, 2021Updated 5 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- PowerShell Runspace Connect-Back Shell☆26Dec 31, 2015Updated 10 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆13Nov 23, 2016Updated 9 years ago