ortegaalfredo / autok-extension
AI-powered bug hunter - vscode plugin.
☆34Updated 5 months ago
Alternatives and similar repositories for autok-extension:
Users that are interested in autok-extension are comparing it to the libraries listed below
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆28Updated last month
- Automated vulnerability discovery and annotation☆64Updated 6 months ago
- Additional active scan checks for BURP☆26Updated 4 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 5 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆35Updated 9 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆25Updated 5 months ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆31Updated 5 months ago
- Ansible build for Afl++ Frida-Mode☆23Updated 8 months ago
- Examine Chrome extensions for security issues☆75Updated last week
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 9 months ago
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆51Updated 2 months ago
- ☆36Updated 3 weeks ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆74Updated 4 months ago
- ☆32Updated last year
- Lena's scripts/code/resources for malware analysis☆25Updated 8 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆63Updated last year
- ☆17Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆51Updated 10 months ago
- ☆115Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆50Updated 11 months ago
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- Dont Gamble with Risk☆14Updated 11 months ago
- Living Off Security Tools☆44Updated 3 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆30Updated 4 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆38Updated 5 months ago