Automated pshtt, trustymail, and sslyze scanning
☆30Feb 18, 2026Updated 2 weeks ago
Alternatives and similar repositories for scanner
Users that are interested in scanner are comparing it to the libraries listed below
Sorting:
- Generate HTTPS reports based on scan data☆15Feb 18, 2026Updated 2 weeks ago
- AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning☆23Feb 25, 2026Updated last week
- Generate AWS Lambda environment zip files for use by cisagov/domain-scan☆12Oct 11, 2023Updated 2 years ago
- Certbot container that stores its configuration in an AWS S3 bucket☆15Updated this week
- Gather domains as a precursor to scanning☆21Feb 18, 2026Updated 2 weeks ago
- A tool for parsing DMARC aggregate reports.☆11Nov 10, 2022Updated 3 years ago
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated last month
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Nov 4, 2024Updated last year
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Mar 1, 2022Updated 4 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 5 months ago
- OVAL Documentation☆15Aug 4, 2017Updated 8 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆48Feb 3, 2026Updated last month
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆16Mar 13, 2022Updated 3 years ago
- Open Source software from The MITRE Corporation☆25Jun 4, 2024Updated last year
- A command line remote for a Roku media box.☆17Apr 10, 2015Updated 10 years ago
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 3 months ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated 2 months ago
- Wordlist creator written in C to generate all possibilities of passwords☆25Jun 16, 2018Updated 7 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Oct 7, 2015Updated 10 years ago
- A set of OVAL Definitions that provides a simple way to test the capability of OVAL Definition Evaluators.☆26Jun 3, 2016Updated 9 years ago
- Migrate team-managed project issues between two JIRA Cloud accounts☆12Nov 12, 2024Updated last year
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆34Jun 4, 2025Updated 9 months ago
- Toolkit for creating cryptographic figures and videos.☆35May 17, 2024Updated last year
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- ☆28May 25, 2021Updated 4 years ago
- Find IP address and Geolocation of target whatsapp user☆11Nov 23, 2023Updated 2 years ago
- Repository with examples of how to solve a tsp with pso, aco, ga and integer programming☆10Oct 9, 2024Updated last year
- Useful Threat Hunting Stuff☆32Sep 1, 2020Updated 5 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- AngularJS interface and simple Node.js REST api for testing Powershell command execution; built on top of powershell-command-executor and…☆30Feb 23, 2015Updated 11 years ago
- General malware analysis stuff☆37Aug 26, 2024Updated last year
- Random Hashcat Scrips☆36Oct 12, 2024Updated last year
- ☆31May 24, 2019Updated 6 years ago
- Simple GUI for Microsoft Defender for Endpoint API machine actions in PowerShell.☆41Jan 11, 2023Updated 3 years ago
- This is a bash script used for ISPConfig 3 server migrations☆15Sep 13, 2016Updated 9 years ago