Red Kite, the Extensible Attack Surface Management tool.
☆91Feb 8, 2026Updated 2 months ago
Alternatives and similar repositories for stalker
Users that are interested in stalker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sub…☆87Feb 14, 2026Updated 2 months ago
- seCureLI is a tool that enables you to experience the delight of building products by helping you get ideas from your head into working s…☆28Jul 15, 2024Updated last year
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 6 months ago
- Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers☆101Updated this week
- 😹 Python project to bruteforce Apache Tomcat manager login with known-default credentials☆99Mar 12, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆37Jan 1, 2024Updated 2 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆36Jan 4, 2026Updated 4 months ago
- 📡 802.11 broadcast analyzer & injector☆174Jun 17, 2025Updated 10 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆107Dec 29, 2024Updated last year
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆111May 30, 2025Updated 11 months ago
- A How-To Guide on using Security Commands and Observing Network Traffic on Wireshark☆18Jan 27, 2026Updated 3 months ago
- A flexible tool that creates a minidump of the LSASS process☆14Jan 18, 2022Updated 4 years ago
- Customized CVE FEED Notifier☆112Apr 22, 2025Updated last year
- one-stop resource for all things offensive security.☆179Apr 21, 2026Updated 2 weeks ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A fast network scanning tool to detect open ports and security vulnerabilities (Compatible with Debian & Red Hat OS)☆127Sep 6, 2025Updated 8 months ago
- Hastly written Tools & Scripts for Personal Use Cases & Bug Bounties☆80Mar 6, 2025Updated last year
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆71Updated this week
- Web Server Vulnerability Scanning Tool☆37Mar 11, 2025Updated last year
- Game Board for NorthSec's Hacker Jeopardy since 2017☆14Updated this week
- Set of tools to audit and exploit STUN/TURN servers☆35Dec 12, 2025Updated 4 months ago
- .NET 4.0 Fast Directory / File Lister☆27Sep 25, 2020Updated 5 years ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆124Apr 25, 2026Updated last week
- An experimental AntiBot, AntiCrawl reverse proxy for serving simple static content.☆53Sep 29, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Repository that contains a set of purposefully erroneous Yara rules.☆61Jul 23, 2025Updated 9 months ago
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- God Mode Detection Rules☆132Aug 8, 2024Updated last year
- TensorFlow code for our ECCV'24 Workshop paper "LightAvatar: Efficient Head Avatar as Dynamic NeLF"☆31Nov 7, 2024Updated last year
- ☆19Oct 17, 2023Updated 2 years ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆167Oct 28, 2025Updated 6 months ago
- Steganography Tool for JPG Images☆65Apr 28, 2026Updated last week
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Mar 1, 2024Updated 2 years ago
- Discover hidden parameters in Caido☆48Mar 30, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- BlueSky OSINT Tool☆15Dec 10, 2024Updated last year
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆44Apr 23, 2026Updated 2 weeks ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- ☆40Aug 2, 2024Updated last year
- A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.☆171Jan 2, 2026Updated 4 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆43Apr 3, 2026Updated last month
- A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.☆362Updated this week