OSS Vulnerability Scanner for Windows Platform
☆154Jan 19, 2020Updated 6 years ago
Alternatives and similar repositories for DetExploit
Users that are interested in DetExploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [WIP] Bot framework with plugin system. Supports Discord (JDA), Twitter (Penicillin / Tweetstorm), Web (Ktor).☆12Jun 12, 2020Updated 5 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 6 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- ☆25May 9, 2021Updated 4 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- ☆14Aug 27, 2025Updated 6 months ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆83Mar 18, 2026Updated last week
- NebulousAD automated credential auditing tool.☆154Apr 8, 2020Updated 5 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 5 months ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 8 months ago
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- Multi-Purpose DNS Server☆144Jun 4, 2025Updated 9 months ago
- ☆15May 17, 2018Updated 7 years ago
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆152Mar 16, 2026Updated last week
- Open source all-in-one CLI tool to semi-automate pentesting.☆176May 21, 2020Updated 5 years ago
- Fast and extensible network scanning library featuring multithreading, ping probing, and scan fetchers.☆40May 1, 2020Updated 5 years ago
- 🪦開発停止👻BetterDiscordのプラグイン。These are plugins for BetterDiscord.☆13May 21, 2020Updated 5 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Dec 23, 2024Updated last year
- A PowerShell Module to create a Client and Server Named Pipe Server on Windows Systems☆11Aug 31, 2018Updated 7 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- kaprino is a new programming language which lies great emphasis on the correctness of the result of programs.☆11Jan 1, 2023Updated 3 years ago
- resource packs for splaturn weapons.☆10Sep 20, 2022Updated 3 years ago
- RISC-V instruction decoder written in Rust.☆17Dec 31, 2025Updated 2 months ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 4 years ago
- ☆11May 7, 2019Updated 6 years ago