Automatic security vulnerability remediation for your code.
☆65Mar 2, 2026Updated this week
Alternatives and similar repositories for bugsy
Users that are interested in bugsy are comparing it to the libraries listed below
Sorting:
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- ☆44Updated this week
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆51Feb 22, 2024Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Jun 10, 2025Updated 8 months ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- Manage attack surface data on Elasticsearch☆24Nov 20, 2023Updated 2 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆24Jan 19, 2026Updated last month
- ☆13Mar 1, 2024Updated 2 years ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated 11 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆59Apr 16, 2024Updated last year
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- decrypt TLS traffic of arbitrary go binaries using SSLKEYLOGFILE debugger hook☆15Oct 24, 2021Updated 4 years ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated last month
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Aug 10, 2021Updated 4 years ago
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- Status Checker is a Python tool for swiftly checking the status of URLs. It categorizes responses by HTTP status codes, offering clear in…☆50May 18, 2025Updated 9 months ago
- AWS Cloud Landscape Search Engine☆20Nov 29, 2023Updated 2 years ago
- backway是一款跨平台远程控制工具,在启动之后,会新建一个http服务,可通过该服务进行远程控制。☆16Feb 10, 2022Updated 4 years ago
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a gi…☆17Jun 7, 2024Updated last year
- Analyse binaries for missing security features, information disclosure and more...☆87Aug 7, 2023Updated 2 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.☆24Aug 26, 2024Updated last year
- ☆18Oct 15, 2024Updated last year
- An opensource tool built to help bug bounty hunters and developers to easily/quickly find the perfect command to validate API keys☆24Apr 20, 2025Updated 10 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- A fast and comprehensive tool for organizational network scanning☆134Apr 15, 2024Updated last year
- From Patch to PoC☆30Nov 19, 2025Updated 3 months ago
- Struts2 Scanning and Utilization 漏洞扫描+利用 s2_001 s2_005 s2_007 s2_008 s2_009 s2_013 s2_015 s2_032 s2_045 s2_046 s2_048 s2_052 s2_053 s2_05…☆20Apr 5, 2023Updated 2 years ago
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆79Jul 13, 2024Updated last year