Tests your API automatically for common API vulnerabilities. Project is still Work In Progress. PRs are appreciated.
☆34Apr 12, 2024Updated last year
Alternatives and similar repositories for offat
Users that are interested in offat are comparing it to the libraries listed below
Sorting:
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆13Aug 20, 2024Updated last year
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 7 months ago
- ☆14Aug 4, 2021Updated 4 years ago
- A simple tool to inject shellcode into the remote process with the ability to spoof parent process.☆16Mar 18, 2021Updated 4 years ago
- Pull Hashes Decryption From Online Sources Using Python☆16Jun 25, 2024Updated last year
- SQLMap with Autonomous AI, phased workflows, RAG memory, and MCP Agent Tools☆76Updated this week
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆20Apr 30, 2024Updated last year
- The home of the SDDLMaker☆28Jan 13, 2025Updated last year
- ☆54May 18, 2024Updated last year
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆66Aug 29, 2023Updated 2 years ago
- ☆65Nov 12, 2022Updated 3 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆38Aug 8, 2025Updated 6 months ago
- ☆32Apr 16, 2025Updated 10 months ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆81Nov 24, 2025Updated 3 months ago
- ExeRay AI detects malicious Windows executables using ML. Analyzes entropy, imports, and metadata for rapid classification, aiding incide…☆60Feb 7, 2026Updated 3 weeks ago
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 10 months ago
- Web Recon Tool 🔍 An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information …☆25Feb 23, 2026Updated last week
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 5 months ago
- An Android SSL Pinning Remover tool for Security research and Bug Bounty☆43Jun 1, 2023Updated 2 years ago
- Rekhta Dictionary Extension code☆10Aug 9, 2022Updated 3 years ago
- Esta es una extensión del proyecto original de Avilla Forensics☆12Nov 18, 2025Updated 3 months ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- ☆42Updated this week
- Code for Java and C++ youtube tutorials in channel: https://www.youtube.com/c/ZulkarnineMahmud.☆11Apr 18, 2022Updated 3 years ago
- Election results data reported for Pakistan 2018 general elections☆11Sep 5, 2018Updated 7 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- Shell Utils is an educational framework designed to make shell programming accessible and powerful. It is the result of extensive work ov…☆13Feb 22, 2026Updated last week
- WSO SHELL , wso shell , WSO.php , wso.php , webshell , wso-shell веб-шелл , шелл , WSO2.5 , WSO2.5.1 , WSO2.php , Shell download, C99 , …☆10Jun 25, 2016Updated 9 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆95Feb 2, 2022Updated 4 years ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆45Sep 25, 2024Updated last year
- ☆47Mar 7, 2025Updated 11 months ago
- This repository contains all the examples related to a series of tutorials that demonstrate how to use the new Montoya API of Burp Suite …☆47Dec 10, 2025Updated 2 months ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Jun 14, 2024Updated last year
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- This repository will contain source codes from the Tradecraft improvement blog series☆14Mar 27, 2025Updated 11 months ago
- Curated UTF-8 URL-encoded character dictionary for injection testing, fuzzing, and bypass techniques against web applications and APIs, f…☆13Sep 20, 2021Updated 4 years ago
- Script en bash de Nmap que se puede personalizar para ajustar el escaneo a tus necesidades.☆12Jul 20, 2024Updated last year