The useful exploit finder
☆826Jan 19, 2026Updated 3 months ago
Alternatives and similar repositories for sicat
Users that are interested in sicat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Docker Remote API Scanner and Exploit☆180Nov 13, 2023Updated 2 years ago
- PacketSpy☆157May 31, 2024Updated last year
- ☆569Mar 28, 2024Updated 2 years ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,327Updated this week
- Reverse shell that can bypass windows defender detection☆173Mar 31, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,424Updated this week
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,278Jul 18, 2024Updated last year
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Feb 3, 2024Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- Tool to find CVEs and Exploits.☆489Feb 28, 2024Updated 2 years ago
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆593Oct 23, 2025Updated 5 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Updated this week
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆515Aug 7, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆700Jan 6, 2026Updated 3 months ago
- ☆319Mar 26, 2024Updated 2 years ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆314May 16, 2024Updated last year
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆357Dec 14, 2023Updated 2 years ago
- Pen Test Report Generation and Assessment Collaboration☆594Apr 10, 2026Updated last week
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,318Mar 25, 2026Updated 3 weeks ago
- A BurpSuite extension for vulnerability Scanning☆29Feb 16, 2024Updated 2 years ago
- ☆166Feb 29, 2024Updated 2 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆53May 26, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- OSINT tool to crawl a site and extract useful recon info.☆461Aug 13, 2025Updated 8 months ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆442May 29, 2024Updated last year
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,833Updated this week
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆276Jun 16, 2024Updated last year
- This repository contains the best fuzzing wordlist files☆34Dec 2, 2024Updated last year
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆312Mar 31, 2024Updated 2 years ago
- hauditor is a tool designed to analyze the security headers returned by a web page.☆178Jul 6, 2024Updated last year
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆21Feb 5, 2024Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,166Mar 8, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆900Apr 10, 2026Updated last week
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆461Mar 28, 2024Updated 2 years ago
- Real fucking shellcode encryptor & obfuscator tool☆1,019Jan 7, 2026Updated 3 months ago
- An XSS Exploitation Tool☆339Dec 5, 2025Updated 4 months ago
- APIDetector: Efficiently scan for exposed Swagger endpoints across web domains and subdomains. Supports HTTP/HTTPS, multi-threading, and …☆369Mar 28, 2025Updated last year
- Smart context-based SSRF vulnerability scanner.☆361May 5, 2022Updated 3 years ago
- NetProbe: Network Probe☆175Oct 13, 2024Updated last year