Generic plugin based web application security fuzzing for anomalies by Slándáil Research Limited
☆13Feb 13, 2024Updated 2 years ago
Alternatives and similar repositories for scanomaly
Users that are interested in scanomaly are comparing it to the libraries listed below
Sorting:
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Simple scripts aiding penetration testing process☆15Mar 10, 2020Updated 5 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34May 16, 2022Updated 3 years ago
- A ton of helpful tools☆15Jul 31, 2016Updated 9 years ago
- ☆18Apr 4, 2019Updated 6 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- scripting IDA like a Pro☆24Oct 27, 2020Updated 5 years ago
- My Custom made Nuceli-Templates☆22Aug 5, 2025Updated 6 months ago
- CVE PoCs☆21Jul 16, 2020Updated 5 years ago
- Repository for LNK stuff☆31Aug 31, 2022Updated 3 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- ☆38Aug 19, 2021Updated 4 years ago
- ☆27Jun 17, 2021Updated 4 years ago
- A collection of scripts for bug-bounty related stuff☆39Sep 4, 2020Updated 5 years ago
- DNS and Target HTTP History Local Storage and Search☆63Feb 14, 2021Updated 5 years ago
- Find exploitable PHP files by parameter fuzzing and function call tracing☆72Jan 24, 2017Updated 9 years ago
- I will share my bug bounty tips here☆32Mar 6, 2023Updated 2 years ago
- Generate Vanity Public Keys for WireGuard.☆36Apr 24, 2022Updated 3 years ago
- A very basic project creating a `.onion` website for Tor using Flask framework and python.☆33Aug 15, 2019Updated 6 years ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆36Nov 3, 2025Updated 3 months ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆33Nov 8, 2021Updated 4 years ago
- SubzzZ to find possible subdomains using passive recon. Tool also support Permutations, Mutations, Alterations.☆38Mar 7, 2021Updated 4 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Rubik's cube solving TensorFlow model with Lego EV3 MindCub3r robot support.☆11Sep 3, 2019Updated 6 years ago
- Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google sear…☆19Aug 10, 2025Updated 6 months ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11May 10, 2025Updated 9 months ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Some basic shell code, when I learn <Gray Hat Hacking>☆11Dec 6, 2014Updated 11 years ago
- Make better use of the embedded browser that comes by default with Burp☆43Jan 1, 2024Updated 2 years ago
- Collection of content discovery wordlists in one wordlist.☆38Jan 18, 2022Updated 4 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆54May 26, 2025Updated 9 months ago
- ☆42Oct 28, 2021Updated 4 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago