delvelabs / tachyonView external linksLinks
Fast http dead file finder.
☆217Jul 11, 2025Updated 7 months ago
Alternatives and similar repositories for tachyon
Users that are interested in tachyon are comparing it to the libraries listed below
Sorting:
- WordPress version identification and vulnerability finder.☆31Oct 4, 2022Updated 3 years ago
- GoldenSAML Attack Libraries and Framework☆77Jun 5, 2024Updated last year
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆86Jan 11, 2024Updated 2 years ago
- Carbon Black TAU Excel 4 Macro Analysis☆44Feb 8, 2024Updated 2 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆277Feb 12, 2021Updated 5 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Nov 30, 2017Updated 8 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Mar 14, 2018Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- AI-based, context-driven network device ranking☆302Feb 1, 2024Updated 2 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆353Aug 27, 2018Updated 7 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Aug 7, 2020Updated 5 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆527Jun 26, 2021Updated 4 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆418Aug 10, 2023Updated 2 years ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆139Apr 29, 2020Updated 5 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 4 years ago
- ☆612Oct 4, 2024Updated last year
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆314Sep 10, 2018Updated 7 years ago
- Powershell C2 Server and Implants☆574Nov 11, 2019Updated 6 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- Some tools to automate recon - 003random☆294Jun 5, 2018Updated 7 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Feb 18, 2023Updated 2 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆279Jan 28, 2025Updated last year
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- Upgrade your netcat shell today!☆58Jul 11, 2017Updated 8 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,363Feb 2, 2026Updated last week
- A tiny and cute URL fuzzer☆402Nov 10, 2022Updated 3 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- ☆128May 22, 2023Updated 2 years ago
- The documents☆56Nov 2, 2017Updated 8 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,013Jul 3, 2018Updated 7 years ago
- kernel privilege escalation enumeration and exploitation framework☆700Aug 2, 2018Updated 7 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago