AWS Security Tool
☆29Jan 1, 2024Updated 2 years ago
Alternatives and similar repositories for Slyther
Users that are interested in Slyther are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Apr 17, 2022Updated 3 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 11 months ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆161Dec 19, 2021Updated 4 years ago
- User enumeration and password spraying tool for testing Azure AD☆71Mar 3, 2022Updated 4 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Apr 5, 2022Updated 3 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Bash script for CTF automating basic enumeration☆41Mar 1, 2022Updated 4 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆22May 15, 2022Updated 3 years ago
- Scanner for public s3 buckets☆12Oct 23, 2017Updated 8 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Mar 2, 2026Updated 3 weeks ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last month
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Dec 17, 2024Updated last year
- PHP lab to test captcha bypassing☆30Jan 8, 2024Updated 2 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- A burp suite extension that enumerates infrastructure and application admin interfaces (OTG-CONFIG-005)☆122Jun 16, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- GeoIP plotting script written in Python to help security teams draw visualized reports from IP addresses☆20May 29, 2022Updated 3 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 10 months ago
- A script for automatize boolean-based blind SQL injections (MVP).☆54Aug 29, 2022Updated 3 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 7 months ago
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆38May 23, 2022Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆102May 11, 2022Updated 3 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 2 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 4 years ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆73Dec 14, 2023Updated 2 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Aug 6, 2021Updated 4 years ago
- This repository is deprecated☆42Jun 6, 2024Updated last year
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆39Mar 5, 2026Updated 3 weeks ago
- A wrapper around tools used for subdomain enumeration, to automate the workflow, on a given domain, written in bash.☆79Aug 2, 2022Updated 3 years ago
- First iteration of ML based Feedback WAF☆59Mar 20, 2024Updated 2 years ago