All-in-one tool for managing vulnerability reports from AppSec pipelines
☆108Jan 11, 2023Updated 3 years ago
Alternatives and similar repositories for purify
Users that are interested in purify are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆21Mar 6, 2023Updated 3 years ago
- Penetration testing utility and antivirus assessment tool.☆314Apr 25, 2023Updated 2 years ago
- An Android SSL Pinning Remover tool for Security research and Bug Bounty☆43Jun 1, 2023Updated 2 years ago
- Tool to predict attacker groups from the techniques and software used☆49Aug 4, 2021Updated 4 years ago
- Smart, friendly and helpful chat bot for OWASP Juice Shop☆11Jan 26, 2026Updated last month
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- Webshell, Virtual Private Server (VPS) and cPanel Database☆39Sep 2, 2022Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Nov 13, 2021Updated 4 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Jul 9, 2025Updated 8 months ago
- POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!☆12Jul 5, 2020Updated 5 years ago
- Contacts Synchronization Private Directory Public Directory City Search Profession Search☆11Oct 21, 2017Updated 8 years ago
- Offensive Security recon tool☆91Aug 27, 2021Updated 4 years ago
- Network footprint scanner platform. Discover domains and run your custom checks periodically.☆429Apr 22, 2022Updated 3 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- ☆14May 27, 2021Updated 4 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago
- powershell tool for VM evasion☆41Oct 2, 2020Updated 5 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- NERVE Continuous Vulnerability Scanner☆456Dec 6, 2023Updated 2 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Dec 8, 2022Updated 3 years ago
- Tools for auditing WAFS☆19Feb 25, 2022Updated 4 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Jun 2, 2016Updated 9 years ago
- CVE-2020-1048 bypass: binary planting PoC☆33Aug 20, 2020Updated 5 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Linux post exploitation privilege escalation enumeration☆257Aug 20, 2020Updated 5 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆27Jun 18, 2024Updated last year
- whoareyou is a tool to find the underlying technology/software used in a list of websites passed through stdin (using Wappalyzer dataset)☆32Jun 15, 2020Updated 5 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Oct 22, 2020Updated 5 years ago
- A collection of personal scripts used in hacking excercises.☆152Oct 15, 2020Updated 5 years ago
- A Burp Suite extension for headless, unattended scanning.☆37Jun 24, 2020Updated 5 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆111Apr 24, 2020Updated 5 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- A cli for cracking, testing vulnerabilities on Json Web Token(JWT)☆136Jan 13, 2026Updated 2 months ago
- Dynamic Application and API Security Testing☆194Apr 5, 2023Updated 2 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆213Mar 27, 2022Updated 3 years ago