justakazh / sicat
The useful exploit finder
☆797Updated 10 months ago
Alternatives and similar repositories for sicat:
Users that are interested in sicat are comparing it to the libraries listed below
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,143Updated 7 months ago
- secator - the pentester's swiss knife☆951Updated last week
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆926Updated 2 weeks ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,014Updated 3 weeks ago
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆520Updated 9 months ago
- Pen Test Report Generation and Assessment Collaboration☆462Updated this week
- ☆310Updated 10 months ago
- Nmap Dashboard Mini Project☆571Updated 8 months ago
- Navigate the CVE jungle with ease.☆1,847Updated this week
- WiFi Penetration Testing & Auditing Tool☆463Updated 3 weeks ago
- AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.☆507Updated this week
- Pentesting automation platform that combines hacking tools to complete assessments☆461Updated last month
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆532Updated 4 months ago
- Invisible network protocol sniffer☆755Updated 5 months ago
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆480Updated last month
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆713Updated 8 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆516Updated last year
- Tool to find CVEs and Exploits.☆464Updated 11 months ago
- ☆530Updated 10 months ago
- HTTP 403 bypass tool☆487Updated 11 months ago
- Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations…☆758Updated 5 months ago
- Script for generating revshells☆461Updated 5 months ago
- Generates millions of keyword-based password mutations in seconds.☆1,262Updated 6 months ago
- The OSTE meta scanner is a comprehensive web vulnerability scanner that combines multiple DAST scanners, including Nikto Scanner, ZAP, Nu…☆277Updated 2 weeks ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆464Updated 6 months ago
- Official Kali Linux tool to check all urls of a domain for SQL injections :)☆318Updated 8 months ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆297Updated this week
- The Internets #1 Subdomain Takeover Tool☆237Updated last month
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆503Updated 2 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆846Updated last week