☆61Nov 4, 2025Updated 4 months ago
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MongoDB CVE-2025-14847 Heap Memory Leak Scanner | OP_COMPRESSED zlib Vulnerability | Bug Bounty & Red Team Tool☆34Dec 28, 2025Updated 2 months ago
- ☆18Nov 2, 2024Updated last year
- A Chrome extension that automatically scans web pages and internal links for user-defined keywords, storing results and sending notificat…☆25Sep 28, 2025Updated 5 months ago
- Escáner básico de vulnerabilidades web (XSS, SQLi, cabeceras) con crawling ligero, escrito en Python.☆13Mar 4, 2026Updated 3 weeks ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆11Aug 12, 2025Updated 7 months ago
- Repository aimed at helping to perform pentests on flutter applications☆18Jul 10, 2024Updated last year
- 🐛 A list of writeups from the MSRC (Microsoft) Bug Bounty program☆31Oct 29, 2025Updated 4 months ago
- crawler for finding reflected parameters and reflecting special characters!☆21Dec 2, 2024Updated last year
- Custom nuclei templates for bug hunting.....☆26May 30, 2024Updated last year
- ☆23Sep 22, 2025Updated 6 months ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Dec 12, 2024Updated last year
- A Modern Bug Bounty and Security Research Management Platform☆97Jun 12, 2025Updated 9 months ago
- A tool to migrate Burpsuite HTTP history to Caido☆35Apr 25, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Process URLs and remove duplicate query parameters.☆27Mar 19, 2024Updated 2 years ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆16Aug 11, 2023Updated 2 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- Cryptography for Pentesters Course [Arabic]☆27Feb 3, 2026Updated last month
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Jul 16, 2025Updated 8 months ago
- ReconX is a powerful automated reconnaissance and vulnerability scanning tool designed for ethical hackers, penetration testers, and secu…☆16Feb 27, 2025Updated last year
- Static-Code-Analysis-Helper helps you perform static code analysis.☆32Feb 20, 2026Updated last month
- Skalle is a handy add-on for Volatility that lets you run it in a graphical user interface. It also adds some cool features!☆25May 30, 2025Updated 9 months ago
- List of all Red Teaming tools and Techniques for each stages☆22Dec 28, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- Google Workspace password sprayer with anti-captcha☆14Mar 11, 2026Updated 2 weeks ago
- 🎯 Chrome Extension - Passive scanner for Dependency Confusion vulnerabilities in npm/PyPI packages☆26Jan 31, 2026Updated last month
- ☆49Jul 8, 2025Updated 8 months ago
- sotap is an open source project in line with so(jni) logging. Any use is at your own risk. You can customize the c file then build and ge…☆44Oct 4, 2025Updated 5 months ago
- Oty is a fast, customizable, CLI tool designed to streamline your Bug Bounty and Pentesting workflows. Powered by a simple yet flexible Y…☆28Jan 27, 2025Updated last year
- ☆38Aug 12, 2020Updated 5 years ago
- ☆21Feb 25, 2022Updated 4 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- My Notes on Regular Expressions for AWAE/OSWE.☆38Sep 5, 2023Updated 2 years ago
- Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY☆10Feb 19, 2023Updated 3 years ago
- Advanced SQL Injection Techniques for Bug Bounty Hunters☆146Feb 10, 2025Updated last year
- 一款支持微信和QQ、UC手机浏览器的分享工具,可以自定义标题、链接、icon等☆12Apr 19, 2018Updated 7 years ago
- Advanced test for proxy & waf☆14Feb 10, 2026Updated last month
- ReconX is a powerful and user-friendly reconnaissance tool designed for security researchers and penetration testers. It provides a compr…☆27Dec 24, 2024Updated last year