Automated Scanning, Pentesting , Exploiting and Reporting
☆21Nov 21, 2021Updated 4 years ago
Alternatives and similar repositories for autoscan
Users that are interested in autoscan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Auto exploiter + Dumper, steal information on victim site, and auto create mailer on victim☆12Jan 6, 2019Updated 7 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Godzilla is an automated scanner tool for bug hunters/pentesters that can scan website for vulnerabilities, Do Information gathering in N…☆30Sep 6, 2019Updated 6 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆10Apr 3, 2020Updated 6 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆20Jul 4, 2020Updated 5 years ago
- Th3_Monster Tool 2.5 ☣ Website Vulnerability Scanner & Auto Exploiter Bot ☣ .☆18Aug 11, 2018Updated 7 years ago
- 😈D3FACER is an auto-defacer used for defacing a lot of website in no time.☆21Jul 12, 2023Updated 2 years ago
- dDumper is a Drupal Vulnerability Scanner & an Auto Exploiter.☆20Mar 11, 2024Updated 2 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 8 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- Google Tink's critical Ed25519 bug related to Java "final" keyword☆11Apr 5, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- Converts a command to a base64 powershell compatible string☆27Jul 31, 2014Updated 11 years ago
- AutoExploiter Wordpress , Joomla , Drupal☆18Mar 27, 2018Updated 8 years ago
- Tutorial Seputar Depes Dan Web Hacking☆39Jun 26, 2022Updated 3 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated last year
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- Auto Updater Joomla Components and Exploits Scanner☆27Apr 1, 2018Updated 8 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 5 years ago
- A simple tool which makes creating nuclei templates even easier.☆37Jun 23, 2024Updated last year
- ☆10Jan 7, 2024Updated 2 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Modules Prestashop Vuln Arbitrary File Upload☆10Dec 29, 2019Updated 6 years ago
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- Another dll injection tool.☆28Jan 25, 2015Updated 11 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Collection of Jupyter notebooks☆13Mar 11, 2021Updated 5 years ago
- ☆18Jun 26, 2017Updated 8 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15May 17, 2020Updated 5 years ago
- Full Auto Exploit tool to SQL Injection: Admin Find -dork generation and grab from cx-Security and proxy cheaker and more :)☆30Feb 22, 2018Updated 8 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 7 years ago
- 漏洞盒子入驻企业列表爬虫☆14Jan 18, 2019Updated 7 years ago
- Golang based web service to scan files with yara rules☆25Jul 6, 2017Updated 8 years ago