koreyhacks / VulnViperView external linksLinks
Web Server Vulnerability Scanning Tool
☆36Mar 11, 2025Updated 11 months ago
Alternatives and similar repositories for VulnViper
Users that are interested in VulnViper are comparing it to the libraries listed below
Sorting:
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆28Nov 26, 2025Updated 2 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 3 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- The official website for The Discord Analytics for Risks & Threats Project.☆22Dec 29, 2025Updated last month
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- ☆23Mar 4, 2025Updated 11 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Nov 10, 2025Updated 3 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 weeks ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆75Sep 1, 2025Updated 5 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 5 months ago
- WPAUDIT: Advanced WordPress security auditing suite & vulnerability scanner. Automates pentesting with Nmap, WPScan, Nuclei, SQLMap. Comp…☆34May 27, 2025Updated 8 months ago
- eBPF Memory Dump Tool☆99Aug 26, 2025Updated 5 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆97Updated this week
- ☆154Dec 19, 2024Updated last year
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆45Aug 5, 2025Updated 6 months ago
- A How-To Guide on using Security Commands and Observing Network Traffic on Wireshark☆18Jan 27, 2026Updated 2 weeks ago
- An automated GitHub Actions-based crawler that fetches and updates public scopes from popular bug bounty platforms (like Hackerone/Bugcro…☆72Feb 8, 2026Updated last week
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆106Dec 2, 2024Updated last year
- Security tool against dependency typosquatting attacks☆54Updated this week
- Secure Code Review AI Agent (SeCoRA) - AI SAST☆54Jan 29, 2025Updated last year
- A very simple open source implementation of Google's Project Naptime☆184Mar 27, 2025Updated 10 months ago
- Used to check Github actions logs for secrets - specifically tj-actions and reviewdog☆22Mar 18, 2025Updated 10 months ago
- Multilingual library made for validation, various form fields, such as: email, telephone, password, cpf, cnpj, credit card, magic numbers…☆19Feb 15, 2025Updated last year
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆41Feb 7, 2026Updated last week
- Automated vulnerability discovery and annotation☆68Jul 26, 2024Updated last year
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆79Feb 7, 2026Updated last week
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆54Nov 9, 2024Updated last year
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 10 months ago
- 🛡️Proactive ransomware defense for Windows, providing secure file hiding through camouflage, encrypted mappings, smart shortcuts and sea…☆16Oct 14, 2025Updated 4 months ago
- PermCheck is a little tool that checks if the files in a PHP project have the executable bit set properly.☆11Feb 8, 2026Updated last week
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 5 months ago
- An index of publicly available and open-source threat detection rulesets.☆131Apr 17, 2025Updated 9 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆185Feb 9, 2025Updated last year
- Toolkit for creating cryptographic figures and videos.☆36May 17, 2024Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Mar 26, 2025Updated 10 months ago
- A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.☆351Feb 7, 2026Updated last week
- A library for intercepting system calls☆103Jan 5, 2025Updated last year
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- one-stop resource for all things offensive security.☆177Feb 3, 2026Updated last week