The Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
☆86Jul 18, 2017Updated 8 years ago
Alternatives and similar repositories for web_exploit_detector
Users that are interested in web_exploit_detector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Dec 15, 2020Updated 5 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- for mass exploiting☆613Jul 14, 2022Updated 3 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Jun 30, 2017Updated 8 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆126Feb 20, 2023Updated 3 years ago
- 针对PHP网马的正则查杀☆13Jan 10, 2018Updated 8 years ago
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 6 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- free exploit framework written use python language version 3.3☆30Mar 31, 2018Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆37May 23, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Python framework for IT security tools☆268Jan 28, 2017Updated 9 years ago
- IP Address Listing Tool☆12Sep 1, 2013Updated 12 years ago
- Simple script to automate brutforcing blind sql injection vulnerabilities☆50Jul 16, 2017Updated 8 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆178Jul 29, 2017Updated 8 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆81Jun 30, 2018Updated 7 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 9 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- OSINT Threat Intel Interface - CLI for HoneyDB☆118Feb 12, 2019Updated 7 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆21Nov 20, 2021Updated 4 years ago
- Truehunter☆30May 15, 2021Updated 4 years ago
- ☆13Jan 20, 2017Updated 9 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- Wireless mouse/keyboard attack with replay/transmit poc☆93Jul 10, 2016Updated 9 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Aug 9, 2017Updated 8 years ago
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆176Dec 1, 2022Updated 3 years ago
- The Traditional Swiss Army Knife for OSINT☆558Jun 10, 2021Updated 4 years ago
- Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.☆81Aug 28, 2017Updated 8 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- An anti-ARP-spoofing application software that use active and passive scanning methods to detect and remove any ARP-spoofer from the netw…☆177Sep 2, 2020Updated 5 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Jul 9, 2019Updated 6 years ago