A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
☆66Nov 13, 2021Updated 4 years ago
Alternatives and similar repositories for avain
Users that are interested in avain are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Oct 13, 2020Updated 5 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆20Apr 5, 2026Updated 2 weeks ago
- Web-based check for Windows privesc vulnerabilities☆139May 14, 2023Updated 2 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆143Jan 25, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- ☆17Mar 21, 2019Updated 7 years ago
- Python Script for SAML2 Authentication Passwordspray☆40Jul 5, 2023Updated 2 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- DupeKeyInjector☆134Apr 16, 2022Updated 4 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Jan 11, 2023Updated 3 years ago
- SpooKey is a keylogger written in C++ that uses kernel-level APIs to capture keystrokes (Linux only. Windows is a work in progress)☆31Feb 12, 2020Updated 6 years ago
- Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vuln…☆33Aug 1, 2021Updated 4 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆21Oct 3, 2019Updated 6 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 7 months ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- Real Time Threat Monitoring Tool☆115Nov 16, 2022Updated 3 years ago
- miscellaneous sploit scripts/hacks☆18Feb 3, 2025Updated last year
- Network/WebApplication Information Gathering, Enumeration and Vulnerability Scanning (Under Development)☆16Feb 2, 2019Updated 7 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 5 months ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]☆35Nov 4, 2018Updated 7 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Jul 9, 2025Updated 9 months ago
- Cross-platform malware development library for anti-analysis techniques☆25Jul 27, 2021Updated 4 years ago
- Perform automated network reconnaissance scans☆238May 4, 2023Updated 2 years ago
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆36Updated this week
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linux☆90Apr 7, 2026Updated last week
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- This Burp extension helps you to find usages of postMessage and recvMessage☆14Feb 20, 2020Updated 6 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆12Feb 24, 2022Updated 4 years ago
- Hunt and Analyze Tor Onion Sites☆24Dec 8, 2022Updated 3 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆37Feb 11, 2020Updated 6 years ago
- Network footprint scanner platform. Discover domains and run your custom checks periodically.☆429Apr 22, 2022Updated 3 years ago
- Web Recon & Exploitation Tool.☆56Mar 8, 2020Updated 6 years ago
- This python script adds some usefull command to stripped vmlinux image☆24Sep 18, 2020Updated 5 years ago