MikroTik RouterOS Security Inspector
☆308Feb 1, 2026Updated 2 months ago
Alternatives and similar repositories for Sara
Users that are interested in Sara are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cisco IOS Security Inspector☆39Dec 29, 2025Updated 3 months ago
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆182Feb 24, 2026Updated last month
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆65Nov 12, 2025Updated 4 months ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆677Mar 5, 2026Updated last month
- Network Security Sniffer☆849Jan 2, 2026Updated 3 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆244Jul 31, 2024Updated last year
- A utility for generating and applying RouterOS / Mikrotik configuration files (.rsc) with help of Jinja2 template engine.☆32Nov 8, 2024Updated last year
- SprayShark is a modular G-Suite password sprayer with threading!☆58May 17, 2025Updated 10 months ago
- ☆20Sep 24, 2025Updated 6 months ago
- a collection of scripts for MikroTik RouterOS☆1,769Mar 25, 2026Updated 2 weeks ago
- A small server that keeps track of traffic usage per IP for RouterOS☆29Jan 14, 2024Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆53Mar 7, 2024Updated 2 years ago
- Network Forensics CLI utility that performs Network Scanning, OSINT, and Attack Detection☆300Nov 29, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆438Mar 2, 2025Updated last year
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆436Updated this week
- Syntax highlighting and completions for the Mikrotik Scripting language for the Sublime Text editor☆67Mar 11, 2024Updated 2 years ago
- NavSec is the most comprehensive passive web vulnerability and privacy scanner. It performs real-time security analysis directly in your …☆22Sep 13, 2025Updated 6 months ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆49Dec 18, 2024Updated last year
- MITM Field Manual☆372Jan 9, 2026Updated 3 months ago
- ☆416May 26, 2025Updated 10 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features cus…☆461Dec 12, 2025Updated 3 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Modern web-based distributed hashcracking solution, built on hashcat☆191Apr 3, 2026Updated last week
- An advanced tool for checking GitHub repositories, with star statistics, including fake star analysis and data visualization.☆90Updated this week
- A powerful reverse shell generator☆46Mar 18, 2026Updated 3 weeks ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Nov 26, 2024Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆76Sep 6, 2024Updated last year
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- A Linux CLI tool for physical and network drive information☆68Dec 6, 2025Updated 4 months ago
- An open-source implementation of Wi-Fi HaLow, a.k.a. IEEE 802.11ah☆29Sep 13, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆159Mar 29, 2026Updated last week
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆207Mar 6, 2025Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆266Nov 22, 2025Updated 4 months ago
- ☆23Jun 28, 2025Updated 9 months ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 4 years ago
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆323Mar 27, 2025Updated last year