Anti-Automation System
☆130Mar 18, 2021Updated 4 years ago
Alternatives and similar repositories for Predator
Users that are interested in Predator are comparing it to the libraries listed below
Sorting:
- DNS caching for humans☆96Dec 9, 2021Updated 4 years ago
- find hardcoded strings from source code☆285Feb 3, 2022Updated 4 years ago
- Dashboard/API + DNS/HTTP Servers to identify Out of Band Resolution in Payloads☆38Jun 10, 2021Updated 4 years ago
- HTML form parser for humans.☆81May 15, 2020Updated 5 years ago
- A python module for dumping usable proxies.☆163Nov 13, 2019Updated 6 years ago
- Improved DOS exploit for wordpress websites (CVE-2018-6389)☆127Oct 1, 2020Updated 5 years ago
- Mass scan IPs for vulnerable services☆1,046Feb 17, 2022Updated 4 years ago
- CORS Misconfiguration Scanner☆1,505Sep 17, 2022Updated 3 years ago
- Locky generates "really" strong yet easy to remember passwords.☆71May 5, 2019Updated 6 years ago
- JShell - Get a JavaScript shell with XSS.☆532May 5, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/lfimap☆16Mar 5, 2016Updated 9 years ago
- Cloak can backdoor any python script with some tricks.☆501May 5, 2019Updated 6 years ago
- Google Search Scraper☆568Aug 23, 2019Updated 6 years ago
- Find endpoints in archived versions of robots.txt☆14Nov 21, 2019Updated 6 years ago
- assess pronounciblity of text☆37Jun 20, 2021Updated 4 years ago
- modern javascript parser☆67Aug 17, 2025Updated 6 months ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Python automation of Docker.sock abuse☆211Dec 8, 2022Updated 3 years ago
- Stuff that doesn't deserves its own repository.☆357Aug 9, 2025Updated 6 months ago
- Repository for hosting my research papers☆511Apr 17, 2024Updated last year
- LinkedIn reconnaissance tool☆55Dec 17, 2021Updated 4 years ago
- A proof of concept for delivering webbugs via AWS lambda☆46Sep 10, 2018Updated 7 years ago
- ☆28Apr 3, 2021Updated 4 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Extract endpoints from apk files.☆877Jan 7, 2022Updated 4 years ago
- Striker is an offensive information and vulnerability scanner.☆2,317Jun 4, 2023Updated 2 years ago
- AWS S3 Bucket Finder.☆14Oct 28, 2025Updated 4 months ago
- An advanced multithreaded admin panel finder written in python.☆836May 17, 2024Updated last year
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- ☆10Oct 30, 2019Updated 6 years ago
- Repo of useful scripts☆104Jun 30, 2020Updated 5 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- finds hidden parameters☆23Aug 12, 2023Updated 2 years ago
- Suite of programs meant to aid in bug hunting and security assessments☆78Dec 29, 2019Updated 6 years ago
- Heuristic Vulnerable Parameter Scanner☆602Jan 8, 2024Updated 2 years ago
- Entropy is a (prototype) WAF driven by maths.☆57May 5, 2019Updated 6 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago