MikroTik RouterOS Security Inspector
☆312Feb 1, 2026Updated 2 months ago
Alternatives and similar repositories for Sara
Users that are interested in Sara are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cisco IOS Security Inspector☆39Dec 29, 2025Updated 4 months ago
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆182Apr 20, 2026Updated last week
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆66Nov 12, 2025Updated 5 months ago
- PowerShell utilities for system administrators☆57Jan 15, 2025Updated last year
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆684Mar 5, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Network Security Sniffer☆852Jan 2, 2026Updated 3 months ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆244Jul 31, 2024Updated last year
- A utility for generating and applying RouterOS / Mikrotik configuration files (.rsc) with help of Jinja2 template engine.☆32Nov 8, 2024Updated last year
- SprayShark is a modular G-Suite password sprayer with threading!☆58May 17, 2025Updated 11 months ago
- ☆20Sep 24, 2025Updated 7 months ago
- a collection of scripts for MikroTik RouterOS☆1,779Apr 23, 2026Updated last week
- A small server that keeps track of traffic usage per IP for RouterOS☆29Jan 14, 2024Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆53Mar 7, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Network Forensics CLI utility that performs Network Scanning, OSINT, and Attack Detection☆302Nov 29, 2024Updated last year
- ☆437Mar 2, 2025Updated last year
- MITM Field Manual☆374Jan 9, 2026Updated 3 months ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆438Updated this week
- Syntax highlighting and completions for the Mikrotik Scripting language for the Sublime Text editor☆67Mar 11, 2024Updated 2 years ago
- NavSec is the most comprehensive passive web vulnerability and privacy scanner. It performs real-time security analysis directly in your …☆23Sep 13, 2025Updated 7 months ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆49Dec 18, 2024Updated last year
- ☆423May 26, 2025Updated 11 months ago
- A system tray application for managing Yggdrasil service☆28Apr 18, 2026Updated last week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- A bash script for performing advanced Google dork searches to find files, names, usernames, emails, phone numbers, and images.☆27Jun 20, 2024Updated last year
- your bestfried for finding LinkedIn Employees on github☆15Mar 28, 2023Updated 3 years ago
- A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features cus…☆465Dec 12, 2025Updated 4 months ago
- Wazuh - Virtual Machines (OVA and AMI)☆20Apr 23, 2026Updated last week
- A powerful reverse shell generator☆47Mar 18, 2026Updated last month
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Nov 26, 2024Updated last year
- Modern web-based distributed hashcracking solution, built on hashcat☆192Apr 23, 2026Updated last week
- An advanced tool for checking GitHub repositories, with star statistics, including fake star analysis and data visualization.☆99Apr 3, 2026Updated 3 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Apr 30, 2021Updated 5 years ago
- A CrowdSec bouncer for MikroTik RouterOS appliance☆66Jun 8, 2025Updated 10 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆76Sep 6, 2024Updated last year
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- A Linux CLI tool for physical and network drive information☆67Dec 6, 2025Updated 4 months ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆161Apr 14, 2026Updated 2 weeks ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year