Fast http dead file finder.
☆217Jul 11, 2025Updated 9 months ago
Alternatives and similar repositories for tachyon
Users that are interested in tachyon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆122Nov 30, 2017Updated 8 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆277Feb 12, 2021Updated 5 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Mar 14, 2018Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- htcap is a web application scanner able to crawl single page application (SPA) in a recursive manner by intercepting ajax calls and DOM c…☆18Sep 23, 2025Updated 7 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆142Apr 29, 2020Updated 6 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- Upgrade your netcat shell today!☆58Jul 11, 2017Updated 8 years ago
- Fast, multi-protocol credential brute-forcer. Parses Nmap, Nessus, and Nexpose output to automatically test default and custom credential…☆2,414Updated this week
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆90May 8, 2018Updated 7 years ago
- htcap is a web application scanner able to crawl single page application (SPA) recursively by intercepting ajax calls and DOM changes.☆626Oct 11, 2021Updated 4 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- ☆614Oct 4, 2024Updated last year
- A tiny and cute URL fuzzer☆402Nov 10, 2022Updated 3 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆250Jun 19, 2024Updated last year
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆418Aug 10, 2023Updated 2 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 5 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- ☆128May 22, 2023Updated 2 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Feb 18, 2023Updated 3 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Some tools to automate recon - 003random☆294Jun 5, 2018Updated 7 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆531Jun 26, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Burp Suite extension to track vulnerability assessment progress☆59Mar 7, 2020Updated 6 years ago
- GoCrack is a management frontend for password cracking tools written in Go☆1,280Nov 19, 2025Updated 5 months ago
- A LinkedIn Scraper☆15Aug 20, 2018Updated 7 years ago
- 做过的实验,踩过的坑☆40Jun 7, 2018Updated 7 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,116Apr 26, 2020Updated 6 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Mar 27, 2017Updated 9 years ago