Crawls URL to get a better image of what is tied to a website.
☆33Jul 9, 2023Updated 2 years ago
Alternatives and similar repositories for wildcrawl
Users that are interested in wildcrawl are comparing it to the libraries listed below
Sorting:
- Built to learn ethical hacking on your own☆142May 3, 2024Updated last year
- Recon (Whois)☆15May 25, 2023Updated 2 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- ShadowDigger: A Python CLI tool for SQLite DB management and doxing. It allows data creation, insertion, and querying, catering to doxing…☆10Jul 9, 2023Updated 2 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆24Jun 13, 2023Updated 2 years ago
- Basic script to generate reverse shell payloads, generally most used in ctf.☆27Mar 20, 2024Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Jul 2, 2025Updated 8 months ago
- Curated list of ransomware-related resources; awesome style.☆32Jan 17, 2025Updated last year
- Admin finder is a tool that serves to find the login page of a website.☆13Oct 16, 2025Updated 4 months ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Apr 5, 2023Updated 2 years ago
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆13May 9, 2020Updated 5 years ago
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated last week
- ☆13Dec 25, 2025Updated 2 months ago
- ☆12Sep 9, 2023Updated 2 years ago
- ☆13Sep 7, 2023Updated 2 years ago
- picoCTF 2023 Writeup (Capture the Flag Competition) with the solutions for the challenges.☆10Jul 20, 2023Updated 2 years ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 3 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Jun 15, 2023Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- Utilities for easy use of custom losses in CatBoost, LightGBM, XGBoost.☆10Updated this week
- An Alexa Skill Sample for building a skill that can take a user through a decision tree, like "What should I eat for breakfast?"☆12Jan 23, 2018Updated 8 years ago
- ☆10Jun 8, 2016Updated 9 years ago
- Xninjaz is a powerful and versatile multi-vulnerability scanner designed to detect various web application vulnerabilities, including Loc…☆11Oct 16, 2025Updated 4 months ago
- Completely strips digital signatures from executables (.exe, .dll, .sys, .drv...) and fixes issues preventing resigning☆16Oct 19, 2025Updated 4 months ago
- Twitch danmaku player & overlay☆12May 1, 2022Updated 3 years ago
- This is a gui interface for airmon-ng☆14Mar 23, 2023Updated 2 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- A very very very simple tool to compile folder to fake ps4/ps5 pkg☆16Dec 3, 2023Updated 2 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- Source code for TMS WEB Core 2nd Edition☆12Apr 16, 2024Updated last year
- ☆13Feb 20, 2026Updated 2 weeks ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Awesome Mathematical Olympiads/Competitions/Contests☆20Jun 7, 2025Updated 8 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Mar 7, 2025Updated 11 months ago
- My Nmap without root privileges! For hackers.☆43Jul 30, 2023Updated 2 years ago
- Bare-bones continuous integration using Docker Hub and Slack.☆10Feb 1, 2015Updated 11 years ago
- Free cybersecurity training resources☆12Feb 5, 2020Updated 6 years ago
- An API wrapper for Discord written in the Garry's Mod Lua Environment. [WIP]☆10May 26, 2024Updated last year