Anti-Automation System
☆130Mar 18, 2021Updated 5 years ago
Alternatives and similar repositories for Predator
Users that are interested in Predator are comparing it to the libraries listed below
Sorting:
- DNS caching for humans☆96Dec 9, 2021Updated 4 years ago
- find hardcoded strings from source code☆285Feb 3, 2022Updated 4 years ago
- HTML form parser for humans.☆81May 15, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/lfimap☆16Mar 5, 2016Updated 10 years ago
- assess pronounciblity of text☆37Jun 20, 2021Updated 4 years ago
- A python module for dumping usable proxies.☆164Nov 13, 2019Updated 6 years ago
- Mass scan IPs for vulnerable services☆1,047Feb 17, 2022Updated 4 years ago
- Locky generates "really" strong yet easy to remember passwords.☆71May 5, 2019Updated 6 years ago
- ☆28Apr 3, 2021Updated 4 years ago
- LFI (Local File Inclusion) Exploitation Tool☆17Jan 4, 2021Updated 5 years ago
- Dashboard/API + DNS/HTTP Servers to identify Out of Band Resolution in Payloads☆38Jun 10, 2021Updated 4 years ago
- CORS Misconfiguration Scanner☆1,508Sep 17, 2022Updated 3 years ago
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 6 years ago
- Improved DOS exploit for wordpress websites (CVE-2018-6389)☆128Oct 1, 2020Updated 5 years ago
- Repository for hosting my research papers☆511Apr 17, 2024Updated last year
- Stuff that doesn't deserves its own repository.☆359Aug 9, 2025Updated 7 months ago
- Google Search Scraper☆569Aug 23, 2019Updated 6 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ☆10Oct 30, 2019Updated 6 years ago
- Find endpoints in archived versions of robots.txt☆14Nov 21, 2019Updated 6 years ago
- Cloak can backdoor any python script with some tricks.☆501May 5, 2019Updated 6 years ago
- JShell - Get a JavaScript shell with XSS.☆533May 5, 2019Updated 6 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- LinkedIn reconnaissance tool☆54Dec 17, 2021Updated 4 years ago
- ☆17Aug 3, 2021Updated 4 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- AWS S3 Bucket Finder.☆14Oct 28, 2025Updated 4 months ago
- Extract endpoints from apk files.☆879Jan 7, 2022Updated 4 years ago
- finds hidden parameters☆23Aug 12, 2023Updated 2 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- Striker is an offensive information and vulnerability scanner.☆2,322Jun 4, 2023Updated 2 years ago
- Python automation of Docker.sock abuse☆211Dec 8, 2022Updated 3 years ago
- Suite of programs meant to aid in bug hunting and security assessments☆77Dec 29, 2019Updated 6 years ago
- Quark is a data visualization framework.☆224Sep 16, 2025Updated 6 months ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- A tool to scan for .DS_Store files on webservers☆35Mar 28, 2021Updated 4 years ago
- Intelligent login bruteforcer.☆912Apr 27, 2023Updated 2 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆363Mar 6, 2025Updated last year
- Repo of useful scripts☆104Jun 30, 2020Updated 5 years ago