josh0xA / PantheonView external linksLinks
IoT Camera Reconnaissance and Live Viewer
☆171Jul 30, 2024Updated last year
Alternatives and similar repositories for Pantheon
Users that are interested in Pantheon are comparing it to the libraries listed below
Sorting:
- PacketSpy☆157May 31, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated last year
- NetProbe: Network Probe☆173Oct 13, 2024Updated last year
- ☆65Apr 28, 2024Updated last year
- Tool designed for fetching, validating, and storing working proxies.☆257Nov 20, 2025Updated 2 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Feb 3, 2024Updated 2 years ago
- Docker Remote API Scanner and Exploit☆180Nov 13, 2023Updated 2 years ago
- Reverse shell that can bypass windows defender detection☆169Feb 3, 2024Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆109Sep 7, 2023Updated 2 years ago
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆78Updated this week
- ☆124Aug 24, 2025Updated 5 months ago
- Web Path Finder☆60Nov 22, 2023Updated 2 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 8, 2026Updated last week
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- WiFi Penetration Testing & Auditing Tool☆715Apr 28, 2025Updated 9 months ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆47Mar 15, 2024Updated last year
- ☆167Feb 29, 2024Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Mar 7, 2025Updated 11 months ago
- skytrack is a planespotting and aircraft OSINT tool made using Python 🛩🔍☆498Dec 19, 2023Updated 2 years ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆311May 16, 2024Updated last year
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆49Feb 6, 2024Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 10 months ago
- Mass bruteforce authentication of common services with common credentials.☆53Dec 2, 2023Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆57Apr 16, 2024Updated last year
- PassBreaker☆65Apr 5, 2024Updated last year
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- A fast subdomain takeover tool☆85Nov 10, 2023Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆662May 10, 2025Updated 9 months ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆73Feb 2, 2024Updated 2 years ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆243Jul 31, 2024Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- hauditor is a tool designed to analyze the security headers returned by a web page.☆176Jul 6, 2024Updated last year
- Real-time detection and defense against malicious network activity and policy violations (exploits, port-scanners, advertising, telemetry…☆26Dec 8, 2025Updated 2 months ago