ra1nb0rn / avainLinks
A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
☆66Updated 4 years ago
Alternatives and similar repositories for avain
Users that are interested in avain are comparing it to the libraries listed below
Sorting:
- A Report Generation Tool for Security Assessment☆65Updated 7 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- ☆46Updated 4 years ago
- Real Time Threat Monitoring Tool☆114Updated 3 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆37Updated 5 years ago
- Unique wordlist generator of unique wordlists.☆41Updated 2 years ago
- An Extended, Modulair, Host Discovery Framework☆42Updated 7 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 5 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆116Updated 5 years ago
- Credentials Checking Framework☆53Updated 2 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 6 years ago
- Scripts and tools for AWS Pentest☆53Updated 5 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆94Updated 7 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 4 years ago
- API testing tool written with Python☆56Updated 8 years ago
- Clickjacking PoC Generator☆35Updated 5 years ago
- ☆92Updated 3 years ago
- Offensive Security recon tool☆91Updated 4 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Updated 5 years ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆68Updated 7 years ago
- Shell script for testing DNS zone transfer (AXFR query) on domains and subdomains recursively.☆49Updated 5 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Updated 6 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Updated 8 years ago
- ☆33Updated last year
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 5 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆77Updated 6 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year