justakazh / sicatLinks
The useful exploit finder
☆810Updated last year
Alternatives and similar repositories for sicat
Users that are interested in sicat are comparing it to the libraries listed below
Sorting:
- secator - the pentester's swiss knife☆1,150Updated 3 weeks ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,163Updated this week
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆1,003Updated 6 months ago
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,259Updated last year
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆645Updated 5 months ago
- Pen Test Report Generation and Assessment Collaboration☆565Updated 3 weeks ago
- AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.☆708Updated 5 months ago
- Pentesting automation platform that combines hacking tools to complete assessments☆513Updated this week
- Network Security Sniffer☆821Updated 2 months ago
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆559Updated 7 months ago
- Nmap Dashboard Mini Project☆618Updated last year
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆450Updated this week
- HTTP 403 bypass tool☆541Updated last year
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆827Updated this week
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆794Updated last week
- ☆314Updated last year
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆423Updated this week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,112Updated last week
- A modular vulnerability scanner with automatic report generation capabilities.☆937Updated this week
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆757Updated 9 months ago
- Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations…☆801Updated last year
- Generates millions of keyword-based password mutations in seconds.☆1,359Updated 4 months ago
- WiFi Penetration Testing & Auditing Tool☆562Updated 5 months ago
- Cervantes is an open-source, collaborative platform designed specifically for pentesters and red teams. It serves as a comprehensive mana…☆410Updated last month
- Autonomous Privilege Escalation using AI☆837Updated 6 months ago
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆321Updated last month
- The OSTE meta scanner is a comprehensive web vulnerability scanner that combines multiple DAST scanners, including Nikto Scanner, ZAP, Nu…☆298Updated last month
- A fast WordPress plugin enumeration tool☆691Updated 2 months ago
- OSINT tool to crawl a site and extract useful recon info.☆414Updated 2 months ago
- Tool to find CVEs and Exploits.☆482Updated last year