elmasy-com / elmasyView external linksLinks
Open Source External Attack Surface Management
☆49Apr 6, 2024Updated last year
Alternatives and similar repositories for elmasy
Users that are interested in elmasy are comparing it to the libraries listed below
Sorting:
- ☆11Feb 14, 2023Updated 3 years ago
- Tool to fuzz for interesting vhost.☆23Jan 8, 2025Updated last year
- Pritunl Access Control System☆10Feb 16, 2023Updated 2 years ago
- ☆11Apr 2, 2022Updated 3 years ago
- Pi Stack project: http://lellep.xyz/pi-stack/☆15Jan 9, 2022Updated 4 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- ☆20Mar 21, 2024Updated last year
- Active Directory Group Policy analyzer☆18Sep 20, 2019Updated 6 years ago
- x86 Assembly Code Examples for Blog Posts☆18Aug 2, 2022Updated 3 years ago
- A Real-time Event Correlation platform☆16Jan 30, 2017Updated 9 years ago
- The Repository pattern adds a separation layer between the data and domain layers of an application. It also makes the data access parts …☆28Jul 19, 2012Updated 13 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Jun 2, 2023Updated 2 years ago
- Tool to scan servers and hosts using dynamic paths.☆21Oct 1, 2025Updated 4 months ago
- Simplest possible calorie counter, as a web-app☆25Jan 24, 2024Updated 2 years ago
- A collection of scripts to aid in reverse engineering and exploit development.☆24Oct 3, 2021Updated 4 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- ☆30Jul 28, 2024Updated last year
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆26Nov 23, 2025Updated 2 months ago
- ☆16Jun 27, 2025Updated 7 months ago
- CLI tool for filtering URLs/IPs with automatically-updated Bug Bounty program scope rules.☆34Dec 31, 2025Updated last month
- UI based on react awesome query builder to visualize rule building on rule engine☆29Apr 29, 2022Updated 3 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆127Dec 23, 2025Updated last month
- PAM Backdoor☆32Mar 29, 2023Updated 2 years ago
- A wrapper around grep, to help you grep for things! - Improved version of gf by @tomnomnom.☆62Nov 17, 2023Updated 2 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆36Aug 12, 2022Updated 3 years ago
- A Posix Shell Script (Bash-compatible) for tracking your IP address (at home, or on devices)☆31Jan 17, 2023Updated 3 years ago
- Efficient, and powerful text editor, with command programming language.☆12Jan 27, 2026Updated 2 weeks ago
- A simple command line interface for webshells☆28Feb 2, 2023Updated 3 years ago
- ☆40Oct 8, 2024Updated last year
- Mapping from bug bounty and vulnerability disclosure programs to respective GitHub organizations☆85Feb 7, 2026Updated last week
- Internet Speed Monitor With Prometheus Metrics☆30Mar 13, 2024Updated last year
- A work in progress project aimed at conversion of SQL queries to LINQ queries☆35Dec 20, 2018Updated 7 years ago
- Default plugins for Jaeles Scanner☆35Nov 5, 2020Updated 5 years ago
- Real world bug bounty wordlists☆117Jul 20, 2023Updated 2 years ago
- ☆74Updated this week
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Dec 21, 2020Updated 5 years ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆34Oct 4, 2024Updated last year