A list of user agents belonging to common web scanners.
☆40Jun 27, 2022Updated 3 years ago
Alternatives and similar repositories for scanner_user_agents
Users that are interested in scanner_user_agents are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- Modified edition of cuckoo☆11Jan 12, 2016Updated 10 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- steal password mozilla firefox ,windows,Linux☆10Oct 12, 2020Updated 5 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Daily updated malware indicator lists from TR-CERT (USOM), including parsed malicious URLs, IPs, and domains.☆15Updated this week
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Jun 20, 2022Updated 3 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆31Jun 19, 2022Updated 3 years ago
- A common database library for managing and querying security data☆18Jan 12, 2026Updated 3 months ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- LILO based Pulse Secure appliance disk image decryptor☆13Mar 20, 2024Updated 2 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Twitter Words of Interest - Generate word lists from twitter searches☆31Nov 10, 2022Updated 3 years ago
- The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.☆13Mar 17, 2024Updated 2 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- CryptnetURLCacheParser is a tool to parse CryptAPI cache files☆21Aug 3, 2024Updated last year
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Mar 1, 2022Updated 4 years ago
- Google Filestream Forensic Tool☆22Mar 10, 2022Updated 4 years ago
- Brutteforce for stego CTFs☆16Nov 2, 2022Updated 3 years ago
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆14Nov 29, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PowerSploit - A PowerShell Post-Exploitation Framework☆11Aug 17, 2020Updated 5 years ago
- This Script contains tools like assetfinder, amass, httprobe, subjack, nmap, waybackurls and gowitness☆14Mar 31, 2022Updated 4 years ago
- A collection of boilerplate code and projects for testing ideas☆14Jan 14, 2026Updated 3 months ago
- Launch a command from within Amiberry to the host OS☆11Dec 26, 2025Updated 3 months ago
- Defending against XSS in SVG files☆31Dec 29, 2019Updated 6 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- Use Axiom relations with an RDBMS☆15Jan 24, 2014Updated 12 years ago
- Automate Windows Defender STIG to 100% Compliance☆19Jul 26, 2024Updated last year
- ☆24Mar 12, 2025Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Relational algebra SQL generator☆33Jan 24, 2014Updated 12 years ago
- A Ruby DSL for crafting SQL Injections☆46Jan 12, 2026Updated 3 months ago
- This is a threat intelligence automatic crawling tool that also contains some high-value threat intelligence.☆21Jun 2, 2021Updated 4 years ago
- Malicious URLs and IP Addresses compiled by USOM (Computer Emergency Response Team of Turkey), updated once a day.☆22Apr 9, 2026Updated last week
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Mar 2, 2022Updated 4 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Mar 15, 2024Updated 2 years ago