Open Source External Attack Surface Management
☆49Apr 6, 2024Updated last year
Alternatives and similar repositories for elmasy
Users that are interested in elmasy are comparing it to the libraries listed below
Sorting:
- Tool to fuzz for interesting vhost.☆23Jan 8, 2025Updated last year
- Pritunl Access Control System☆10Feb 16, 2023Updated 3 years ago
- ☆25Jan 16, 2026Updated last month
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Pi Stack project: http://lellep.xyz/pi-stack/☆15Jan 9, 2022Updated 4 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- ☆20Mar 21, 2024Updated last year
- Automated determination of which AWS services run where☆20Feb 26, 2026Updated last week
- Active Directory Group Policy analyzer☆18Sep 20, 2019Updated 6 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Jun 2, 2023Updated 2 years ago
- The Repository pattern adds a separation layer between the data and domain layers of an application. It also makes the data access parts …☆28Jul 19, 2012Updated 13 years ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Sep 11, 2024Updated last year
- Tool to scan servers and hosts using dynamic paths.☆21Oct 1, 2025Updated 5 months ago
- A curated list of amazingly libraries, services and resources to work with PDF files☆16Jan 28, 2026Updated last month
- A collection of scripts to aid in reverse engineering and exploit development.☆24Oct 3, 2021Updated 4 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- A CI/CD-verified list of the internet's known-good public DNS servers (from public-dns.info) Updated weekly!☆36Jan 17, 2026Updated last month
- Web Portal Lite is a web dashboard to manage a page of links. It offers a minimal feature set to the feature rich Web Portal☆20Sep 18, 2023Updated 2 years ago
- ☆30Jul 28, 2024Updated last year
- A tool designed to immitate netcat for the purposes of SSH's ProxyCommand☆28Apr 6, 2022Updated 3 years ago
- ☆16Jun 27, 2025Updated 8 months ago
- CLI tool for filtering URLs/IPs with automatically-updated Bug Bounty program scope rules.☆34Dec 31, 2025Updated 2 months ago
- UI based on react awesome query builder to visualize rule building on rule engine☆29Apr 29, 2022Updated 3 years ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Mar 6, 2023Updated 3 years ago
- whoareyou is a tool to find the underlying technology/software used in a list of websites passed through stdin (using Wappalyzer dataset)☆32Jun 15, 2020Updated 5 years ago
- PAM Backdoor☆32Mar 29, 2023Updated 2 years ago
- A wrapper around grep, to help you grep for things! - Improved version of gf by @tomnomnom.☆62Nov 17, 2023Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆128Dec 23, 2025Updated 2 months ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆36Aug 12, 2022Updated 3 years ago
- A Posix Shell Script (Bash-compatible) for tracking your IP address (at home, or on devices)☆31Jan 17, 2023Updated 3 years ago
- The next generation encrypted file sharing project☆95Updated this week
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Dec 13, 2025Updated 2 months ago
- ☆29Dec 11, 2025Updated 2 months ago
- Efficient, and powerful text editor, with command programming language.☆12Jan 27, 2026Updated last month
- A simple command line interface for webshells☆28Feb 2, 2023Updated 3 years ago
- Mapping from bug bounty and vulnerability disclosure programs to respective GitHub organizations☆85Feb 21, 2026Updated 2 weeks ago
- ☆40Oct 8, 2024Updated last year
- convert secret patterns to gf compatible.☆38Feb 11, 2023Updated 3 years ago
- Internet Speed Monitor With Prometheus Metrics☆30Mar 13, 2024Updated last year