Red Kite, the Extensible Attack Surface Management tool.
☆89Feb 8, 2026Updated last month
Alternatives and similar repositories for stalker
Users that are interested in stalker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sub…☆87Feb 14, 2026Updated last month
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆176Apr 23, 2025Updated 11 months ago
- seCureLI is a tool that enables you to experience the delight of building products by helping you get ideas from your head into working s…☆28Jul 15, 2024Updated last year
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 5 months ago
- Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers☆97Updated this week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- 😹 Python project to bruteforce Apache Tomcat manager login with known-default credentials☆99Mar 12, 2024Updated 2 years ago
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆37Jan 1, 2024Updated 2 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Jan 4, 2026Updated 2 months ago
- 📡 802.11 broadcast analyzer & injector☆166Jun 17, 2025Updated 9 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆107Dec 29, 2024Updated last year
- Store and retrieve encrypted secrets with PowerShell on Windows, Linux, or MacOS and also from KeePass 2 databases on Windows☆34Mar 4, 2026Updated 3 weeks ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆111May 30, 2025Updated 9 months ago
- A How-To Guide on using Security Commands and Observing Network Traffic on Wireshark☆18Jan 27, 2026Updated 2 months ago
- A cloud NES emulator written in Rust. Originally written for NorthSec CTF 2021.☆22Aug 30, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Customized CVE FEED Notifier☆113Apr 22, 2025Updated 11 months ago
- one-stop resource for all things offensive security.☆178Feb 21, 2026Updated last month
- Professional Wargaming LLM Toolbox☆21Jul 9, 2025Updated 8 months ago
- A fast network scanning tool to detect open ports and security vulnerabilities (Compatible with Debian & Red Hat OS)☆126Sep 6, 2025Updated 6 months ago
- Hastly written Tools & Scripts for Personal Use Cases & Bug Bounties☆81Mar 6, 2025Updated last year
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆68Mar 6, 2026Updated 3 weeks ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆29Nov 26, 2025Updated 4 months ago
- Set of tools to audit and exploit STUN/TURN servers☆34Dec 12, 2025Updated 3 months ago
- .NET 4.0 Fast Directory / File Lister☆27Sep 25, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆120Updated this week
- An experimental AntiBot, AntiCrawl reverse proxy for serving simple static content.☆53Sep 29, 2024Updated last year
- Repository that contains a set of purposefully erroneous Yara rules.☆61Jul 23, 2025Updated 8 months ago
- A cybersecurity challenge, based on a real world finding☆12Jul 11, 2024Updated last year
- God Mode Detection Rules☆132Aug 8, 2024Updated last year
- TensorFlow code for our ECCV'24 Workshop paper "LightAvatar: Efficient Head Avatar as Dynamic NeLF"☆31Nov 7, 2024Updated last year
- CSCoin Specification and tools☆10Mar 30, 2017Updated 8 years ago
- ☆19Oct 17, 2023Updated 2 years ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆166Oct 28, 2025Updated 4 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Steganography Tool for JPG Images☆64Updated this week
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Mar 1, 2024Updated 2 years ago
- ☆11May 30, 2021Updated 4 years ago
- ☆382Apr 18, 2024Updated last year
- Discover hidden parameters in Caido☆48Jan 30, 2026Updated last month
- Multilingual library made for validation, various form fields, such as: email, telephone, password, cpf, cnpj, credit card, magic numbers…☆19Feb 15, 2025Updated last year
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year