☆10Jul 8, 2024Updated last year
Alternatives and similar repositories for Mergen
Users that are interested in Mergen are comparing it to the libraries listed below
Sorting:
- ☆13Mar 23, 2023Updated 2 years ago
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- ☆13Jun 14, 2024Updated last year
- Cloudflare Bypass Script☆23Dec 12, 2019Updated 6 years ago
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated last year
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆39May 20, 2024Updated last year
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 10 months ago
- FastVulnVerify is an advanced Python tool developed to quickly identify common vulnerabilities encountered during penetration testing and…☆36Sep 16, 2024Updated last year
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 5 years ago
- ☆49Jan 14, 2025Updated last year
- CVE-2023-23192☆13Mar 27, 2023Updated 2 years ago
- ☆23Jun 28, 2025Updated 8 months ago
- ☆11Nov 5, 2025Updated 3 months ago
- ☆10Mar 27, 2022Updated 3 years ago
- repository containing some nmap scripts☆16Jan 15, 2021Updated 5 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated last month
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- ☆10Aug 11, 2025Updated 6 months ago
- This repository will contain source codes from the Tradecraft improvement blog series☆14Mar 27, 2025Updated 11 months ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- libflutter.so(s) modified for traffic intercepting removing certificate pinning validation. Dart version is 2.10.5☆12Jul 11, 2021Updated 4 years ago
- ☆10Feb 20, 2026Updated last week
- 🐛 A list of writeups from the Google VRP Bug Bounty program☆12Jun 10, 2025Updated 8 months ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆17Jul 11, 2025Updated 7 months ago
- generates unique subdomain names and runs httpx on them☆17Apr 8, 2024Updated last year
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Implementation for - Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches☆13Oct 9, 2019Updated 6 years ago
- A comprehensive reconnaissance and vulnerability scanning tool that combines multiple security assessment capabilities into a single auto…☆26Jun 24, 2025Updated 8 months ago
- ☆10Aug 14, 2023Updated 2 years ago
- automated sticky keys backdoor☆10Feb 12, 2016Updated 10 years ago
- A tool to attack ARP☆15May 27, 2021Updated 4 years ago
- A comprehensive WiFi penetration testing framework for security professionals☆16Jul 18, 2025Updated 7 months ago
- ☆11Dec 17, 2023Updated 2 years ago
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Apr 8, 2020Updated 5 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- Small tool to decode ASP.NET __VIEWSTATE variable when doing webpentests☆15Feb 27, 2021Updated 5 years ago
- 25.11.2021 Siber Güvenlik İçin Python Eğitiminde Yazılan Kodlar☆13Nov 25, 2021Updated 4 years ago