freelabz / secator
secator - the pentester's swiss knife
☆945Updated this week
Alternatives and similar repositories for secator:
Users that are interested in secator are comparing it to the libraries listed below
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,141Updated 6 months ago
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆925Updated last week
- Pen Test Report Generation and Assessment Collaboration☆462Updated last month
- Nmap Dashboard Mini Project☆570Updated 8 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,003Updated 3 weeks ago
- Navigate the CVE jungle with ease.☆1,843Updated this week
- The useful exploit finder☆793Updated 10 months ago
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆1,716Updated this week
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆503Updated 2 months ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆713Updated 8 months ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆611Updated 8 months ago
- Collection of cheat sheets useful for pentesting☆393Updated 7 months ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆447Updated 10 months ago
- ☆309Updated 10 months ago
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆519Updated 9 months ago
- Invisible network protocol sniffer☆758Updated 5 months ago
- The Network Execution Tool☆3,575Updated this week
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆526Updated 4 months ago
- Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations…☆758Updated 5 months ago
- The OSTE meta scanner is a comprehensive web vulnerability scanner that combines multiple DAST scanners, including Nikto Scanner, ZAP, Nu…☆275Updated last week
- Web Security Scanner☆313Updated 8 months ago
- Generates millions of keyword-based password mutations in seconds.☆1,257Updated 6 months ago
- HTTP 403 bypass tool☆485Updated 10 months ago
- Sticky notes for pentesting, bug bounty, CTF.☆652Updated 2 weeks ago
- 🚀 Caido releases, wiki and roadmap☆1,276Updated last month
- All-in-One Toolkit for BruteForce Attacks☆588Updated 4 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,906Updated last week
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆845Updated this week
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,226Updated 2 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,634Updated last week