OSS Vulnerability Scanner for Windows Platform
☆154Jan 19, 2020Updated 6 years ago
Alternatives and similar repositories for DetExploit
Users that are interested in DetExploit are comparing it to the libraries listed below
Sorting:
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- Essential tool for finding blind injection attacks.☆50Feb 6, 2019Updated 7 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆83Feb 17, 2026Updated 2 weeks ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 5 years ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- ☆14Aug 27, 2025Updated 6 months ago
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- ☆25May 9, 2021Updated 4 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- NebulousAD automated credential auditing tool.☆154Apr 8, 2020Updated 5 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Dec 23, 2024Updated last year
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆152Dec 8, 2025Updated 2 months ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 4 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 7 months ago
- Multi-Purpose DNS Server☆144Jun 4, 2025Updated 8 months ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 4 months ago
- Script to automate PUT HTTP method exploitation to get shell☆125Jun 25, 2020Updated 5 years ago
- Fast and extensible network scanning library featuring multithreading, ping probing, and scan fetchers.☆40May 1, 2020Updated 5 years ago
- Checklist and tools for increasing security of Apache Airflow☆32May 7, 2021Updated 4 years ago
- Open source all-in-one CLI tool to semi-automate pentesting.☆165May 21, 2020Updated 5 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- Python implementation of RSA reverse shell.☆11Dec 31, 2016Updated 9 years ago
- Web Crawler, Scanner, and Analyzer Framework (Shell-Script based)☆101Jun 20, 2019Updated 6 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- ☆94Aug 17, 2020Updated 5 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago