freelabz / secatorLinks
secator - the pentester's swiss knife
☆1,151Updated this week
Alternatives and similar repositories for secator
Users that are interested in secator are comparing it to the libraries listed below
Sorting:
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,258Updated last year
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆1,005Updated 7 months ago
- The useful exploit finder☆811Updated last year
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,125Updated last week
- Pen Test Report Generation and Assessment Collaboration☆568Updated this week
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆830Updated 2 weeks ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,172Updated last week
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆2,190Updated last week
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,045Updated this week
- Nmap Dashboard Mini Project☆619Updated last year
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆798Updated this week
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆425Updated this week
- Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations…☆802Updated last year
- Collection of cheat sheets useful for pentesting☆505Updated last year
- A modular vulnerability scanner with automatic report generation capabilities.☆963Updated this week
- Header Exploitation HTTP☆662Updated last week
- 🚀 Caido releases, wiki and roadmap☆1,885Updated 2 weeks ago
- Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethica…☆848Updated this week
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆451Updated last week
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆650Updated 5 months ago
- Autoswagger by Intruder - detect API auth weaknesses☆1,598Updated 2 months ago
- AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.☆723Updated 6 months ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆459Updated last year
- Autonomous Privilege Escalation using AI☆838Updated 7 months ago
- HTTP 403 bypass tool☆576Updated last year
- The OSTE meta scanner is a comprehensive web vulnerability scanner that combines multiple DAST scanners, including Nikto Scanner, ZAP, Nu…☆299Updated last month
- 💀 Don't fear the Reaper 👻☆609Updated last month
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆557Updated this week
- A fast WordPress plugin enumeration tool☆698Updated 2 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆677Updated 5 months ago