justakazh / sicatLinks
The useful exploit finder
☆814Updated last year
Alternatives and similar repositories for sicat
Users that are interested in sicat are comparing it to the libraries listed below
Sorting:
- secator - the pentester's swiss knife☆1,161Updated this week
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,186Updated last week
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,261Updated last year
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆1,008Updated 8 months ago
- Pen Test Report Generation and Assessment Collaboration☆574Updated 2 weeks ago
- AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.☆805Updated 7 months ago
- Nmap Dashboard Mini Project☆620Updated last year
- Network Security Sniffer☆837Updated last month
- Pentesting automation platform that combines hacking tools to complete assessments☆515Updated last week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,180Updated last week
- ☆317Updated last year
- Autonomous Privilege Escalation using AI☆843Updated 7 months ago
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆653Updated 6 months ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆461Updated last year
- Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations…☆802Updated last year
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆801Updated 3 weeks ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆839Updated this week
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆770Updated 10 months ago
- HTTP 403 bypass tool☆607Updated last year
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,051Updated this week
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆565Updated last month
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆326Updated 2 months ago
- C2 infrastructure over Microsoft Teams.☆731Updated 10 months ago
- Generates millions of keyword-based password mutations in seconds.☆1,377Updated 5 months ago
- Script for generating revshells☆478Updated last year
- WiFi Penetration Testing & Auditing Tool☆593Updated 6 months ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆428Updated last week
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆275Updated last year
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆2,224Updated last week
- A modular vulnerability scanner with automatic report generation capabilities.☆974Updated this week