Red Kite, the Extensible Attack Surface Management tool.
☆90Feb 8, 2026Updated 2 months ago
Alternatives and similar repositories for stalker
Users that are interested in stalker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sub…☆87Feb 14, 2026Updated 2 months ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆175Apr 23, 2025Updated 11 months ago
- seCureLI is a tool that enables you to experience the delight of building products by helping you get ideas from your head into working s…☆28Jul 15, 2024Updated last year
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 6 months ago
- Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers☆101Updated this week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- 😹 Python project to bruteforce Apache Tomcat manager login with known-default credentials☆99Mar 12, 2024Updated 2 years ago
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆37Jan 1, 2024Updated 2 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆36Jan 4, 2026Updated 3 months ago
- 📡 802.11 broadcast analyzer & injector☆174Jun 17, 2025Updated 9 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆107Dec 29, 2024Updated last year
- Store and retrieve encrypted secrets with PowerShell on Windows, Linux, or MacOS and also from KeePass 2 databases on Windows☆34Mar 4, 2026Updated last month
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆111May 30, 2025Updated 10 months ago
- A How-To Guide on using Security Commands and Observing Network Traffic on Wireshark☆18Jan 27, 2026Updated 2 months ago
- A cloud NES emulator written in Rust. Originally written for NorthSec CTF 2021.☆22Aug 30, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Customized CVE FEED Notifier☆112Apr 22, 2025Updated 11 months ago
- one-stop resource for all things offensive security.☆179Feb 21, 2026Updated last month
- Professional Wargaming LLM Toolbox☆22Jul 9, 2025Updated 9 months ago
- A fast network scanning tool to detect open ports and security vulnerabilities (Compatible with Debian & Red Hat OS)☆127Sep 6, 2025Updated 7 months ago
- Hastly written Tools & Scripts for Personal Use Cases & Bug Bounties☆81Mar 6, 2025Updated last year
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- Game Board for NorthSec's Hacker Jeopardy since 2017☆14May 17, 2025Updated 10 months ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆29Nov 26, 2025Updated 4 months ago
- Set of tools to audit and exploit STUN/TURN servers☆34Dec 12, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- .NET 4.0 Fast Directory / File Lister☆27Sep 25, 2020Updated 5 years ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆120Apr 6, 2026Updated last week
- An experimental AntiBot, AntiCrawl reverse proxy for serving simple static content.☆53Sep 29, 2024Updated last year
- Repository that contains a set of purposefully erroneous Yara rules.☆61Jul 23, 2025Updated 8 months ago
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- A cybersecurity challenge, based on a real world finding☆11Jul 11, 2024Updated last year
- God Mode Detection Rules☆132Aug 8, 2024Updated last year
- CSCoin Specification and tools☆10Mar 30, 2017Updated 9 years ago
- ☆19Oct 17, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆167Oct 28, 2025Updated 5 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Mar 1, 2024Updated 2 years ago
- ☆11May 30, 2021Updated 4 years ago
- ☆382Apr 18, 2024Updated last year
- Discover hidden parameters in Caido☆48Mar 30, 2026Updated 2 weeks ago
- Multilingual library made for validation, various form fields, such as: email, telephone, password, cpf, cnpj, credit card, magic numbers…☆19Feb 15, 2025Updated last year
- Wireless penetration testing framework. Automates WPA/WPA2/WEP/WPS attacks - recon to exploitation in one command. aircrack-ng + hashcat …☆22Apr 10, 2026Updated last week