Pentesting, made easy.
☆149Mar 26, 2026Updated last month
Alternatives and similar repositories for kitsec-core
Users that are interested in kitsec-core are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Hack3r News B'darija☆18Jan 1, 2023Updated 3 years ago
- Another pentest of a vulnerable windows server☆15Sep 17, 2021Updated 4 years ago
- ☆14Jun 29, 2023Updated 2 years ago
- POC for CVE-2021-41091☆65May 20, 2023Updated 2 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- Describe how to use ffuf different options with examples☆14Jun 13, 2022Updated 3 years ago
- 🔎 Hunt down social media accounts by username across social networks☆11Mar 14, 2020Updated 6 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆37Mar 13, 2023Updated 3 years ago
- Automate Scoping, OSINT and Recon assessments.☆114Feb 3, 2026Updated 2 months ago
- ☆20Jul 7, 2024Updated last year
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 3 years ago
- Cloudformation Template to Launch the SOC from Kali Purple☆54Dec 8, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36May 27, 2023Updated 2 years ago
- ☆12Aug 22, 2017Updated 8 years ago
- A really good cybersec reading materials.☆13Aug 13, 2022Updated 3 years ago
- Bug Hunting Handbook☆11Aug 11, 2022Updated 3 years ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆148Aug 2, 2023Updated 2 years ago
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated last year
- BnademOverFlow's Official Website☆36Mar 6, 2023Updated 3 years ago
- offensive security scripts and documentation☆30Mar 9, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip☆26May 26, 2020Updated 5 years ago
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- This is a simulation of attack by (Voodoo Bear) APT group targeting entities in Eastern Europe the attack campaign was active as early as…☆11Jun 19, 2024Updated last year
- <img src=x onerroralert(1);>☆11Jul 12, 2014Updated 11 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆83May 23, 2023Updated 2 years ago
- Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The c…☆17Mar 30, 2023Updated 3 years ago
- wp content injection mass exploit Perl Script☆12Jul 11, 2017Updated 8 years ago
- WebApp for BugBounty Hunters☆14Mar 24, 2017Updated 9 years ago
- Extracted data & informations from the Conti & TrickBot leaks.☆15Mar 12, 2022Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- hacking tools☆14Jan 29, 2023Updated 3 years ago
- Pull Hashes Decryption From Online Sources Using Python☆15Jun 25, 2024Updated last year
- This script identifies Host Header Injection vulnerabilities in a list of URLs or a specific domain, outputting the vulnerable locations …☆15May 23, 2023Updated 2 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆87May 5, 2023Updated 2 years ago