Burp suite Certificate modification tool
☆18Apr 23, 2023Updated 2 years ago
Alternatives and similar repositories for FakeCert
Users that are interested in FakeCert are comparing it to the libraries listed below
Sorting:
- ☆12Sep 22, 2022Updated 3 years ago
- Secure Hacker - Admin Panel Detector☆19Mar 26, 2018Updated 7 years ago
- A collection of pentesting web scanners☆36Mar 22, 2024Updated last year
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 2 years ago
- This script is to build Wazuh 4.3 environment☆11May 30, 2022Updated 3 years ago
- ☆14Mar 8, 2023Updated 2 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Dec 8, 2025Updated 2 months ago
- ☆28Sep 10, 2022Updated 3 years ago
- Yet another OSINT automator.☆18Nov 15, 2020Updated 5 years ago
- 🐳 VMs are bloat. Dockerise your VAPT environment☆79Apr 19, 2025Updated 10 months ago
- The long shadow to emerge as other Git repositories☆18Updated this week
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Mar 30, 2021Updated 4 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Dec 20, 2025Updated 2 months ago
- Personally developed tools for buffer overflow attacks☆24Sep 25, 2022Updated 3 years ago
- Various AD tools needed for penetration testing in one place.☆23Jul 13, 2023Updated 2 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Sep 2, 2020Updated 5 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- PEDA - Python Exploit Development Assistance for GDB☆23Aug 6, 2025Updated 6 months ago
- This is the tutorial to repair kex in rootless nethunter termux.☆20Oct 1, 2023Updated 2 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- A proof-of-concept Node.js ransomware☆21Mar 27, 2022Updated 3 years ago
- ☆25Mar 21, 2020Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- A semi-automatic osint/recon framework.☆25May 22, 2024Updated last year
- A GUI for MSF Venom that serves the generated payload for you, in addition to launching a listener using the provided port.☆22Jul 26, 2020Updated 5 years ago
- Proxy in terminal, hide you ip address.☆23Jul 30, 2023Updated 2 years ago
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆110Jul 31, 2023Updated 2 years ago
- POC exploit for CVE-2015-10141☆30Aug 11, 2025Updated 6 months ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆71Oct 2, 2023Updated 2 years ago
- A burp suite extension that enumerates infrastructure and application admin interfaces (OTG-CONFIG-005)☆122Jun 16, 2022Updated 3 years ago
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- PHP lab to test captcha bypassing☆30Jan 8, 2024Updated 2 years ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- SpooKey is a keylogger written in C++ that uses kernel-level APIs to capture keystrokes (Linux only. Windows is a work in progress)☆31Feb 12, 2020Updated 6 years ago
- Subdomain Bruteforce - Bounty Quick Code☆31Sep 6, 2024Updated last year
- Lightweight File Integrity Monitoring Tool☆33Apr 20, 2024Updated last year
- A tool designed to analyse email headers☆40Oct 4, 2022Updated 3 years ago