Detect and decode encoded strings, recursively.
☆923Sep 16, 2025Updated 5 months ago
Alternatives and similar repositories for Decodify
Users that are interested in Decodify are comparing it to the libraries listed below
Sorting:
- Cloak can backdoor any python script with some tricks.☆501May 5, 2019Updated 6 years ago
- Crack hashes in seconds.☆1,863Dec 10, 2024Updated last year
- JShell - Get a JavaScript shell with XSS.☆532May 5, 2019Updated 6 years ago
- Striker is an offensive information and vulnerability scanner.☆2,317Jun 4, 2023Updated 2 years ago
- Locky generates "really" strong yet easy to remember passwords.☆71May 5, 2019Updated 6 years ago
- Nano is a family of PHP web shells which are code golfed for stealth.☆446Feb 18, 2020Updated 6 years ago
- Intelligent login bruteforcer.☆909Apr 27, 2023Updated 2 years ago
- modern javascript parser☆67Aug 17, 2025Updated 6 months ago
- HTTP parameter discovery suite.☆6,091Feb 20, 2025Updated last year
- Reconnaissance Swiss Army Knife☆2,015Jan 26, 2021Updated 5 years ago
- CSRF Scanner☆584Jun 28, 2024Updated last year
- Extract endpoints from apk files.☆877Jan 7, 2022Updated 4 years ago
- find hardcoded strings from source code☆285Feb 3, 2022Updated 4 years ago
- A Tool for Domain Flyovers☆5,906May 22, 2022Updated 3 years ago
- A Powerful Subdomain Takeover Tool☆964Oct 17, 2023Updated 2 years ago
- Most advanced XSS scanner.☆14,773Apr 26, 2025Updated 10 months ago
- Awesome XSS stuff☆5,064Oct 30, 2024Updated last year
- A python module for dumping usable proxies.☆163Nov 13, 2019Updated 6 years ago
- CORS Misconfiguration Scanner☆1,505Sep 17, 2022Updated 3 years ago
- An advanced multithreaded admin panel finder written in python.☆836May 17, 2024Updated last year
- A swiss army knife for pentesting networks☆9,082Dec 6, 2023Updated 2 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,132Dec 7, 2022Updated 3 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,474Jan 9, 2025Updated last year
- Mass scan IPs for vulnerable services☆1,046Feb 17, 2022Updated 4 years ago
- File upload vulnerability scanner and exploitation tool.☆3,300May 8, 2025Updated 9 months ago
- Incredibly fast crawler designed for OSINT.☆12,712Feb 10, 2026Updated 3 weeks ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,613Dec 10, 2018Updated 7 years ago
- A friend of SQLmap which will do what you always expected from SQLmap.☆450May 5, 2019Updated 6 years ago
- Google Search Scraper☆568Aug 23, 2019Updated 6 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,120Apr 21, 2024Updated last year
- Know the dangers of credential reuse attacks.☆2,094Dec 9, 2025Updated 2 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,650Jan 5, 2026Updated last month
- Anti-Automation System☆130Mar 18, 2021Updated 4 years ago
- This tool can be used to brute discover GET and POST parameters☆1,393Aug 24, 2019Updated 6 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,380May 22, 2020Updated 5 years ago
- Entropy is a (prototype) WAF driven by maths.☆57May 5, 2019Updated 6 years ago
- ☆276Oct 19, 2021Updated 4 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,068Apr 26, 2020Updated 5 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,914Apr 13, 2022Updated 3 years ago