IOC/Hash scanner and IDS layer 4 designed to be portable and fast
☆27Jan 28, 2026Updated last month
Alternatives and similar repositories for anubi
Users that are interested in anubi are comparing it to the libraries listed below
Sorting:
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- rcracki_mt : used to perform a rainbow table attack on password hashes☆13Sep 25, 2015Updated 10 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- See here:☆43Dec 6, 2012Updated 13 years ago
- ☆15Aug 23, 2025Updated 6 months ago
- A tutorial and resources for exploit development learners☆10Jan 25, 2021Updated 5 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Feb 15, 2017Updated 9 years ago
- Security scanner tool for Plone CMS.☆19May 14, 2012Updated 13 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- ☆20Jan 25, 2019Updated 7 years ago
- Automatically converts your firefox browser into a hacking tool by installing required plugins.☆12Jun 26, 2017Updated 8 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Jul 6, 2024Updated last year
- ☆14Sep 28, 2023Updated 2 years ago
- import library.zip in memory, with the interface the same as zipimport.☆10Jan 10, 2026Updated last month
- Advanced way to mitigate bot attacks for large networks☆11Mar 3, 2019Updated 7 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- Outil de triage automatisé de différents types de collectes d'artefacts.☆17Dec 8, 2025Updated 2 months ago
- Google Hack Database Web Site Scrapper w/ DB updater utility. ASP.NET MVC web utility and Windows application for generating google hack …☆11Jun 23, 2016Updated 9 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- Hunting Newly Registered Domains☆10Jan 6, 2019Updated 7 years ago
- Collection of red team scripts, resources & configs.☆15Feb 14, 2026Updated 2 weeks ago
- Some crackme i built for Android☆12Apr 15, 2020Updated 5 years ago
- Distributed nmap.☆13May 25, 2023Updated 2 years ago
- This project is an AI-powered Security Information and Event Management (SIEM) system designed for real-time threat detection and respons…☆20Nov 10, 2024Updated last year
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Nov 5, 2024Updated last year
- ☆16Oct 6, 2023Updated 2 years ago
- dnsoverhttps - D'oh!☆14Sep 20, 2018Updated 7 years ago
- CSharp4Pentesters☆11Mar 5, 2022Updated 4 years ago