π Web Application Vulnerability Scanner π
β17May 21, 2022Updated 3 years ago
Alternatives and similar repositories for karen
Users that are interested in karen are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AI web vulneraribilty scanner π€β20Feb 22, 2024Updated 2 years ago
- A simple tool to check subdomains for clickjacking attack.β12Mar 30, 2021Updated 4 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.β12Jan 12, 2026Updated 2 months ago
- Priv8 Tools Offensive Security WordPress_AutoExploiterβ28Apr 17, 2022Updated 3 years ago
- Developed a website to scan any web app. User enters the targeted URL in the website to find security vulnerabilities in the code and visβ¦β16Feb 23, 2015Updated 11 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI β’ AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A flask web app made for scanning vulnerabilites on a website, network exploitation, reconnaissanceβ27Jan 16, 2023Updated 3 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.β14Feb 20, 2022Updated 4 years ago
- Scrippy is a browser extension that holds sql statements (think clip board) to aid devlopers in the testing of websites for basic code inβ¦β12Aug 21, 2022Updated 3 years ago
- Blockchain Based DApp for Secure Sharing of Student Credentialsβ10Feb 8, 2022Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigationsβ17Dec 6, 2020Updated 5 years ago
- Hanoman is an GUI antivirus engine sigature based detection πβ47Oct 3, 2021Updated 4 years ago
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for mβ¦β12Feb 1, 2022Updated 4 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find themβ17Feb 1, 2021Updated 5 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., reβ¦β18Jun 30, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI β’ AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- π A small Password Attackβ15Apr 1, 2024Updated last year
- Automatic & lightning fast wordpress vulnerability scannerβ45Nov 19, 2021Updated 4 years ago
- Find secrets and passwords in container images and file systemsβ15Nov 16, 2022Updated 3 years ago
- Blockchain based contracting/tendering systemβ13Feb 12, 2024Updated 2 years ago
- Very Powerful and Easy Automated Web Scannerβ23Feb 2, 2021Updated 5 years ago
- A voting system implemented using Blockchain Technology.β19Jun 7, 2023Updated 2 years ago
- A set of tools, procedures, and playbooks for performing bug bountiesβ17Dec 2, 2018Updated 7 years ago
- β11Mar 19, 2020Updated 6 years ago
- β17Jan 2, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The PCI DSS Compliance Toolkit is an open-source project aimed at helping organizations achieve and maintain compliance with the (PCI DSβ¦β19Dec 13, 2023Updated 2 years ago
- A food ordering website for restaurant and caf Γ© for dine-in and takeawayβ17Jun 29, 2023Updated 2 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive β¦β18Aug 20, 2023Updated 2 years ago
- β13Jun 10, 2022Updated 3 years ago
- Complete Automated pentest framework for Information Gatheringβ43Dec 2, 2019Updated 6 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)β42Dec 2, 2020Updated 5 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitieβ13Jan 6, 2022Updated 4 years ago
- Auto exploiter + Dumper, steal information on victim site, and auto create mailer on victimβ11Jan 6, 2019Updated 7 years ago
- Post-Exploitation module for Penetration Tester and Hackers.β27Dec 29, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Scripts related to offensiveosint.ioβ23Jun 5, 2020Updated 5 years ago
- Google dorks for SQL injection, Local File Inclusion, open CCTV cams and sensitive information.β14Jul 6, 2018Updated 7 years ago
- open source vulnerability scanner and information gathering toolβ16Jan 28, 2025Updated last year
- Reverse shell using socket programming in pythonβ15Dec 8, 2022Updated 3 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.β18May 19, 2024Updated last year
- Bitcoin Wallet Crackerβ13May 19, 2022Updated 3 years ago
- Flexible Penetrate Testing Auxiliary Suiteβ73Jun 19, 2023Updated 2 years ago