ihuzaifashoukat / wpauditView external linksLinks
WPAUDIT: Advanced WordPress security auditing suite & vulnerability scanner. Automates pentesting with Nmap, WPScan, Nuclei, SQLMap. Comprehensive reports. Ideal for ethical hackers & Kali Linux.
☆34May 27, 2025Updated 8 months ago
Alternatives and similar repositories for wpaudit
Users that are interested in wpaudit are comparing it to the libraries listed below
Sorting:
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Nov 10, 2025Updated 3 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 3 months ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated 11 months ago
- This JavaScript CLI "undeletes' packages that have been removed from the NPM registry☆29Dec 18, 2025Updated last month
- Project documentation about the development, releasing, and maintenance of the Ubuntu Linux distribution.☆20Updated this week
- 🛡️Proactive ransomware defense for Windows, providing secure file hiding through camouflage, encrypted mappings, smart shortcuts and sea…☆16Oct 14, 2025Updated 4 months ago
- This is a repo for our docker image of the kubelet binary.☆13Feb 4, 2026Updated last week
- Shared features of vscode-clangd and coc-clangd☆13Feb 3, 2026Updated last week
- Reverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.☆121Updated this week
- ☆48Dec 20, 2025Updated last month
- NextPGP is a elegant and powerful, modern online PGP tool built with Next.js. It can generate keys, manage keyrings, encrypt and decrypt …☆26Feb 7, 2026Updated last week
- ☆31Oct 2, 2025Updated 4 months ago
- IDA helper plugin to reverse engineer Objective-C code☆43Jun 12, 2025Updated 8 months ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆310Updated this week
- ReconPro is a specialized Google dorking tool designed for cybersecurity professionals and bug bounty hunters.☆44Sep 19, 2025Updated 4 months ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 5 months ago
- An index of publicly available and open-source threat detection rulesets.☆131Apr 17, 2025Updated 9 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆75Sep 1, 2025Updated 5 months ago
- This is an official implementation for "SAM-Swin: SAM-Driven Dual-Swin Transformers with Adaptive Lesion Enhancement for Laryngo-Pharynge…☆31Oct 4, 2025Updated 4 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆134May 7, 2025Updated 9 months ago
- Touti Cracker is a cross-platform ethical hacking toolkit for educational purposes, featuring password cracking, WiFi auditing, and rever…☆49Jan 9, 2026Updated last month
- [ICML 2025] VistaDPO: Video Hierarchical Spatial-Temporal Direct Preference Optimization for Large Video Models☆39Jun 14, 2025Updated 8 months ago
- Exploit to dump ipmi hashes☆37Apr 21, 2023Updated 2 years ago
- ☆154Dec 19, 2024Updated last year
- System Validation Platform☆12Sep 18, 2025Updated 4 months ago
- Material for a tutorial on Bayesian analysis of survey data☆12Dec 30, 2025Updated last month
- PHP SDK to communicate with Plug&Pay☆10Feb 4, 2026Updated last week
- Python3 Script to Remove all Overlays Generated by Kometa.☆36Jan 1, 2026Updated last month
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 weeks ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Jul 21, 2025Updated 6 months ago
- The Python book for developers who miss curly braces. Learn real Python while complaining about whitespace. 15 chapters of education, com…☆15Aug 21, 2025Updated 5 months ago
- Code for the paper "CBVLM: Training-free Explainable Concept-based Large Vision Language Models for Medical Image Classification", Comput…☆17Nov 24, 2025Updated 2 months ago
- Fun stuff with the HiWonder TurboPi robot car☆12Feb 4, 2024Updated 2 years ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated 9 months ago
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆11Jul 16, 2024Updated last year
- Easily set Mac Retina display to higher unsupported resolutions☆12Feb 5, 2023Updated 3 years ago
- Rest API Documentation☆13Feb 7, 2025Updated last year
- Hook for the PoC for exploiting CVE-2024-32002☆16May 19, 2024Updated last year
- Ensure your password safety by scanning in data breaches.☆115Dec 9, 2025Updated 2 months ago