Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...
☆93Aug 31, 2022Updated 3 years ago
Alternatives and similar repositories for Bugs-feed
Users that are interested in Bugs-feed are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Feb 25, 2022Updated 4 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Jun 3, 2021Updated 4 years ago
- Metaheuristic Optimization framewoRK. Test the generator available at https://generator.mork-optimization.com/☆28Updated this week
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- Captcha for Discord!☆11Mar 6, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated 2 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 4 years ago
- DirBruter is a Python based CLI tool. It looks for hidden or existing directories/files using brute force method. It basically works by l…☆17Nov 15, 2023Updated 2 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆201Sep 21, 2021Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆73Dec 14, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at once☆48Aug 19, 2021Updated 4 years ago
- Laravel RCE exploit. CVE-2018-15133☆35Mar 22, 2022Updated 4 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last month
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- Yet another content discovery tool☆119Nov 16, 2024Updated last year
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Grawler is a tool written in PHP which comes with a web interface that automates the task of using google dorks, scrapes the results, and…☆212May 19, 2024Updated last year
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 11 months ago
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Feb 2, 2022Updated 4 years ago
- Daily alert when a new domain name is registered and contains your keywords☆119Oct 23, 2023Updated 2 years ago
- Generate Python code to recreate a request from your browser.☆26Dec 24, 2022Updated 3 years ago
- A tool for simplifying the process of researching IOCs.☆25Sep 24, 2021Updated 4 years ago
- An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.☆98Sep 28, 2025Updated 5 months ago
- ☆94Jan 17, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 💠 A supercharged "New Tab" experience.☆18Oct 17, 2021Updated 4 years ago
- client-side prototype pullution vulnerability scanner☆46Aug 23, 2021Updated 4 years ago
- Collaborative pentest tool with highly customizable tools☆73Jan 6, 2022Updated 4 years ago
- A simple PHP web backdoor allows you to retrieve directory/file contents and upload file(s) from the local machine or remote URL.☆20Sep 18, 2021Updated 4 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆113Sep 15, 2022Updated 3 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- Simple volatility profile builder based on Docker container☆21Aug 24, 2020Updated 5 years ago