A classifier for detecting soft 404 pages
☆16Sep 10, 2022Updated 3 years ago
Alternatives and similar repositories for soft-404
Users that are interested in soft-404 are comparing it to the libraries listed below
Sorting:
- Moved to HappyHackingSpace/metamaska☆23Feb 11, 2026Updated 3 weeks ago
- Moved to HappyHackingSpace/pirebok☆14Feb 11, 2026Updated 3 weeks ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- Vulnerable Target (VT) is a specialized tool designed for security professionals, researchers, and educators that creates intentionally v…☆33Updated this week
- ☆14Dec 11, 2025Updated 2 months ago
- Tool support for literature review subtle process.☆18May 5, 2017Updated 8 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- PowerShell script to disable NetBIOS on Windows☆12Jul 19, 2021Updated 4 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Collection of PowerShell scripts to interact with SCCM 2012☆16Oct 19, 2019Updated 6 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- ☆10Jan 25, 2023Updated 3 years ago
- Fetch Metadata server security middleware for Go☆11Oct 16, 2019Updated 6 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- Various scripts & tools☆12Apr 22, 2024Updated last year
- Small collection of PAGE XML related scripts used at the ZPD Würzburg☆12Aug 2, 2024Updated last year
- (OS X) Drains battery of laptops via a script. Originally used in an educational-setting to store computers over the summer.☆10May 5, 2014Updated 11 years ago
- A sub-domain reconnaissance written in golang☆12Jan 11, 2018Updated 8 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Generate IDN homographs and phishing domains☆13Aug 21, 2023Updated 2 years ago
- Backup system for system administrators who require reliable backups with minimum fuss.☆22Jan 1, 2026Updated 2 months ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- An OSINT tool to find data leaks on a targeted website☆17Mar 30, 2021Updated 4 years ago
- Quickly manage DNS records for domains owned within GoDaddy, Namecheap and Route53☆11Jul 19, 2021Updated 4 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- 🍎MacBook Pro for Pentest☆12Mar 1, 2020Updated 6 years ago
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 3 months ago
- Fix Mac OS X time using ntpdate☆13Oct 12, 2014Updated 11 years ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- ☆11Jul 28, 2020Updated 5 years ago
- ☆12Jan 21, 2019Updated 7 years ago
- Automatically download subtitles for videos on a Synology Diskstation☆10Apr 27, 2016Updated 9 years ago
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆22Apr 12, 2020Updated 5 years ago
- Scripts for sharing.☆17Oct 10, 2022Updated 3 years ago
- A proving grounds for young and aspiring BBOT modules☆15Aug 31, 2022Updated 3 years ago
- Installer preseed configurations for Kali Linux☆15Oct 20, 2021Updated 4 years ago
- ☆10Jan 26, 2016Updated 10 years ago