Obtain a clean-cut architecture at the launch of a mission and run some tests ( subdomain search, fuzzing, make screenshots on a given perimeter )
☆25Jul 18, 2023Updated 2 years ago
Alternatives and similar repositories for Yelaa
Users that are interested in Yelaa are comparing it to the libraries listed below
Sorting:
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆28Updated this week
- Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions.☆217Aug 26, 2024Updated last year
- Root-me Hall Of Fame dashboard☆14Mar 30, 2023Updated 2 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆64Feb 6, 2022Updated 4 years ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆18Jan 10, 2026Updated last month
- Map binary data into a beautiful chart☆14Jan 9, 2026Updated last month
- ☆37Oct 3, 2023Updated 2 years ago
- Rust implementation of the DNSCAT2 protocol☆21Apr 29, 2021Updated 4 years ago
- List of Docute Plugins.☆22Dec 25, 2021Updated 4 years ago
- Bake shellcode to get malicious.exe☆27Jul 25, 2023Updated 2 years ago
- A standalone WMI protocol for CrackMapExec☆51Feb 3, 2020Updated 6 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- A logging ASKPASS binary☆29May 29, 2020Updated 5 years ago
- Some Tutorials and Things to Help Bug Hunter☆31Mar 17, 2021Updated 4 years ago
- Nmap Web Dashboard and Reporting☆34May 1, 2022Updated 3 years ago
- Various scripts and codes☆84Apr 23, 2021Updated 4 years ago
- 一款支持检测web应用程序未授权访问缺陷的burp suite插件,可自定义配置检测字段以及返回包json数据分析☆12Apr 22, 2024Updated last year
- Adaptive eXocortex & Integrated Outer Memory Framework☆34Mar 15, 2020Updated 5 years ago
- Your subdomains are free for the taking - no API key, no mistaking! 🕺☆37Feb 27, 2023Updated 3 years ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- A simple python package for doublet detection in scRNA-seq data☆11Mar 30, 2023Updated 2 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- A FullC2 Framework TUI + Web UI That Focuses On Network Stressing☆14Aug 24, 2025Updated 6 months ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- A thread dump analyzer tool running on your browser or in your JVM that generates DOT documents out of `jstack` outputs.☆10Jul 10, 2024Updated last year
- Custom Kdelive Effect Stacks for quick color correction and grading.☆14May 19, 2025Updated 9 months ago
- A CLI tool and library allowing to simply decode all kind of BigIP cookies.☆39Jul 7, 2020Updated 5 years ago
- client-side prototype pullution vulnerability scanner☆46Aug 23, 2021Updated 4 years ago
- CveXplore☆42Sep 12, 2025Updated 5 months ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆10Dec 8, 2022Updated 3 years ago
- Virtual host bruteforcer against given network range or single ip☆11Mar 21, 2019Updated 6 years ago
- A BACnet layer for Scapy☆13Nov 25, 2015Updated 10 years ago
- Just simple PoC for the Atlassian Jira exploit. Provides code execution for unauthorised user on a server.☆11Jul 21, 2022Updated 3 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- PeopleScrap is used to gather information (OSINT) about people in a company☆11Jan 22, 2019Updated 7 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago