Allow exporting the information downloaded with sqlmap to a relational Database like Postgres and sqlite
☆44Sep 12, 2024Updated last year
Alternatives and similar repositories for mapXplore
Users that are interested in mapXplore are comparing it to the libraries listed below
Sorting:
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated last month
- PowerShell script to generate ShellCode in various formats☆45Sep 25, 2024Updated last year
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆140Dec 7, 2024Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- 🌒 Shell command obfuscation to avoid detection systems☆122Oct 10, 2022Updated 3 years ago
- BLE based C2 for Hak5's Bash Bunny☆19Oct 31, 2023Updated 2 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- Damn Vulnerable SCA Application☆42Feb 13, 2026Updated 2 weeks ago
- A simple tool to interact with web shells and command injection vulnerabilities☆36Nov 26, 2024Updated last year
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- Powershell script to help Speed up Threat hunting incident response processes☆43Feb 3, 2024Updated 2 years ago
- 基于python实现的web日志分析工具☆18Aug 19, 2022Updated 3 years ago
- 基于Go和YARA规则 对windows进程和文件进行检测☆19Sep 20, 2024Updated last year
- [CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner☆17Sep 26, 2024Updated last year
- OSTE WLA automate the process of analyzing web server logs with the Python Web Log Analyzer.☆44Jan 13, 2024Updated 2 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- ☆15Apr 20, 2019Updated 6 years ago
- Mass bruteforce authentication of common services with common credentials.☆54Dec 2, 2023Updated 2 years ago
- CVE-2024-24576 Proof of Concept☆20Apr 10, 2024Updated last year
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 2 months ago
- 一款Windows GUI界面的渗透测试工具箱,以 Rolan+ 参数化工具启动器为核心,集成正则表达式处理、AI 智能分析等功能。支持TscanPlus(xlsx)端口扫描结果导入快速联动工具,支持天狐工具箱工具导入实现快速部署,提升安全测试和渗透工作的效率。☆68Nov 19, 2025Updated 3 months ago
- Burp Suite Professional Edition .☆18Jul 24, 2025Updated 7 months ago
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 2 months ago
- ☆19Jan 24, 2023Updated 3 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52May 26, 2024Updated last year
- With the help of this automated script, you will never lose track of recently released CVEs.☆53Feb 19, 2022Updated 4 years ago
- ☆26Apr 25, 2025Updated 10 months ago
- Basic script to generate reverse shell payloads, generally most used in ctf.☆27Mar 20, 2024Updated last year
- 渗透测试手册☆21Mar 8, 2020Updated 5 years ago
- A packer which adds encrypted shell to protect your PE file☆28Nov 16, 2024Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 20, 2026Updated last week
- Hidedump:a lsassdump tools that may bypass EDR☆51May 23, 2024Updated last year
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated last year
- Burp Suite extension that enhances Burp Active Scan by adding template engine specific SSTI payloads.☆24Feb 20, 2024Updated 2 years ago
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated last year
- Directory Traversal Scanner 是一个高性能的目录遍历漏洞扫描工具,专门用于检测和验证 Web 应用程序中的路径遍历漏洞。通过异步并发扫描和智能 WAF 绕过技术,帮助安全研究人员快速发现潜在的安全隐患。Directory Traversal Sca…☆35Mar 28, 2025Updated 11 months ago
- ☆30Jul 28, 2024Updated last year