Security tools report parsers for Faradaysec.com
☆60Mar 9, 2026Updated last month
Alternatives and similar repositories for faraday_plugins
Users that are interested in faraday_plugins are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Faraday's Command Line Interface☆52Feb 12, 2026Updated 2 months ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- ☆18Jan 8, 2025Updated last year
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Jul 2, 2021Updated 4 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Resources for Code Cafe Online 4th May 2020☆11May 5, 2020Updated 5 years ago
- scanner-s3-buckets with list of sites☆18Jun 30, 2019Updated 6 years ago
- ☆13Dec 12, 2022Updated 3 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- Small Helper Library to increase automatically the file descriptors limits for the current process☆24Jul 10, 2023Updated 2 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Dec 6, 2024Updated last year
- Remove Offensive and Profane Words from Wordlists☆16Jul 27, 2023Updated 2 years ago
- ☆14Oct 14, 2022Updated 3 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆10Oct 5, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Our team's CTF writeups☆11Jan 15, 2020Updated 6 years ago
- Wireless discovery and exploitation framework written in Python☆18Dec 17, 2010Updated 15 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Jan 20, 2020Updated 6 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆19Nov 28, 2019Updated 6 years ago
- Apache Tomcat exploit and Pentesting guide for penetration tester☆66Sep 2, 2022Updated 3 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- Nuclei Pre-Master Template Downloader☆23Aug 8, 2024Updated last year
- ☆13Apr 21, 2021Updated 5 years ago
- List all tracks of an artist ranked by poularity at http://localhost:3000/tracks/{artistName}☆10Sep 24, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Feb 1, 2019Updated 7 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Parse exported CSV files and create Excel friendly CSV file.☆12Jul 20, 2017Updated 8 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆12Feb 7, 2018Updated 8 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆88Jun 21, 2021Updated 4 years ago
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆75Apr 25, 2023Updated 3 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- giskismet – Wireless recon visualization tool☆56Aug 26, 2016Updated 9 years ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆16Sep 8, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- THC "R U There" network discovery tool☆30May 1, 2020Updated 5 years ago
- Public BanditFuzz Repo☆12Jan 12, 2021Updated 5 years ago
- Endpoint monitoring stack.☆19Nov 5, 2015Updated 10 years ago
- Create a private Discord CTI "Dashboard" using various Discord bots It,'s a simple and effective way to stay informed and up-to-date on t…☆20Feb 16, 2023Updated 3 years ago
- Compilation of JavaScript XSS oneliners payloads that rocks your nuts!☆24Jul 14, 2017Updated 8 years ago
- A command based package for simple display of statistics☆25Updated this week