π Web Application Vulnerability Scanner π
β17May 21, 2022Updated 3 years ago
Alternatives and similar repositories for karen
Users that are interested in karen are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple tool to check subdomains for clickjacking attack.β12Mar 30, 2021Updated 5 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.β12Jan 12, 2026Updated 3 months ago
- Priv8 Tools Offensive Security WordPress_AutoExploiterβ28Apr 17, 2022Updated 3 years ago
- Developed a website to scan any web app. User enters the targeted URL in the website to find security vulnerabilities in the code and visβ¦β16Feb 23, 2015Updated 11 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.β14Feb 20, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Automatically exported from code.google.com/p/pweb-suiteβ14Jun 8, 2016Updated 9 years ago
- Scrippy is a browser extension that holds sql statements (think clip board) to aid devlopers in the testing of websites for basic code inβ¦β12Aug 21, 2022Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigationsβ17Dec 6, 2020Updated 5 years ago
- Hanoman is an GUI antivirus engine sigature based detection πβ47Oct 3, 2021Updated 4 years ago
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for mβ¦β12Feb 1, 2022Updated 4 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find themβ17Feb 1, 2021Updated 5 years ago
- π A small Password Attackβ15Apr 1, 2024Updated 2 years ago
- Automatic & lightning fast wordpress vulnerability scannerβ45Nov 19, 2021Updated 4 years ago
- Find secrets and passwords in container images and file systemsβ15Nov 16, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer β’ AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Very Powerful and Easy Automated Web Scannerβ23Feb 2, 2021Updated 5 years ago
- PathCoin (transfer bitcoin without network interaction) - proof of concept demonstrationβ10Nov 19, 2023Updated 2 years ago
- A set of tools, procedures, and playbooks for performing bug bountiesβ18Dec 2, 2018Updated 7 years ago
- β17Jan 2, 2020Updated 6 years ago
- The PCI DSS Compliance Toolkit is an open-source project aimed at helping organizations achieve and maintain compliance with the (PCI DSβ¦β20Dec 13, 2023Updated 2 years ago
- β13Jun 10, 2022Updated 3 years ago
- Modules Prestashop Vuln Arbitrary File Uploadβ10Dec 29, 2019Updated 6 years ago
- Complete Automated pentest framework for Information Gatheringβ43Dec 2, 2019Updated 6 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)β42Dec 2, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilitβ¦β16Apr 20, 2019Updated 6 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitieβ13Jan 6, 2022Updated 4 years ago
- Auto exploiter + Dumper, steal information on victim site, and auto create mailer on victimβ12Jan 6, 2019Updated 7 years ago
- Post-Exploitation module for Penetration Tester and Hackers.β27Dec 29, 2021Updated 4 years ago
- Scripts related to offensiveosint.ioβ23Jun 5, 2020Updated 5 years ago
- Google dorks for SQL injection, Local File Inclusion, open CCTV cams and sensitive information.β14Jul 6, 2018Updated 7 years ago
- Reverse shell using socket programming in pythonβ15Dec 8, 2022Updated 3 years ago
- Web attack vectors collectionβ20Nov 1, 2020Updated 5 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.β18May 19, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Bitcoin Wallet Crackerβ13May 19, 2022Updated 3 years ago
- Flexible Penetrate Testing Auxiliary Suiteβ73Jun 19, 2023Updated 2 years ago
- β12May 30, 2019Updated 6 years ago
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLISTβ15May 30, 2023Updated 2 years ago
- Black Hat Ethical Hacking | PHP Backdoor Shell v1.0β19May 22, 2018Updated 7 years ago
- A Payload Injector for bugbounties written in goβ70Jul 18, 2020Updated 5 years ago
- A Discord Python Selfbot to put reactions on messagesβ10Oct 12, 2025Updated 6 months ago