1C RAS Offensive Security Tool
☆28Oct 4, 2023Updated 2 years ago
Alternatives and similar repositories for rasoff
Users that are interested in rasoff are comparing it to the libraries listed below
Sorting:
- The OWApp Benchmark: an OWASP-compliant Vulnerable Android App Dataset☆44Apr 15, 2025Updated 10 months ago
- exfiltration/infiltration toolkit☆50Oct 31, 2024Updated last year
- bypassing the twitter safety link firewall :)☆12May 4, 2025Updated 9 months ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- Check bitrix vulnerabilities☆91Jan 22, 2024Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30May 7, 2024Updated last year
- go-utils☆12Nov 22, 2025Updated 3 months ago
- This Russia Doesn't Exist☆14Feb 21, 2024Updated 2 years ago
- Rust bindings to Microsoft Windows users / groups management API☆34Dec 27, 2025Updated 2 months ago
- Advanced Hunting Queries☆20Updated this week
- CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool☆42Dec 5, 2025Updated 2 months ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- BugBounty Hub: Your one-stop destination for Bug Bounty excellence! Explore Nuclei Templates and BugBounty Worldlists for comprehensive …☆16Apr 3, 2025Updated 11 months ago
- Public OCI-Image (docker image) Security Checker☆20Feb 16, 2026Updated 2 weeks ago
- 1C Exploit Kit☆78Dec 8, 2021Updated 4 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- ☆26Jan 7, 2024Updated 2 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- ☆19Sep 18, 2023Updated 2 years ago
- It's my solution for bugbounty automation☆22Feb 24, 2026Updated last week
- Generate reverse shells in command line with Go !☆20Aug 9, 2020Updated 5 years ago
- ☆20Sep 24, 2025Updated 5 months ago
- karma WiFi attack implementation☆56Oct 23, 2024Updated last year
- Useful collection of scapy-scripts and more☆32Jun 23, 2024Updated last year
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated last year
- D-Link NAS CVE-2024-3273 Exploit Tool☆99Apr 7, 2024Updated last year
- Nmap script to check vulnerability CVE-2021-21975☆27Apr 2, 2021Updated 4 years ago
- Bruteforces Fortinet SSL VPNs☆57Sep 19, 2023Updated 2 years ago
- Unauthenticated Remote Code Execution via Angular-Base64-Upload Library☆26Jul 12, 2025Updated 7 months ago
- reverse socks tunneler with ntlm and proxy support☆28Nov 24, 2019Updated 6 years ago
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆29Oct 17, 2024Updated last year
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆32Feb 3, 2023Updated 3 years ago
- A wrapper around grep, to help you grep for things! - Improved version of gf by @tomnomnom.☆62Nov 17, 2023Updated 2 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆137Jan 22, 2025Updated last year
- ☆189Jan 23, 2024Updated 2 years ago
- Набор скриптов для парсинга агрегаторов уязвимостей и выгрузки информации в YouTrack☆30Jan 30, 2024Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- ☆29Oct 15, 2023Updated 2 years ago
- Developed a Software that detects students face and then marks attendance after training face recognizer☆10Apr 30, 2018Updated 7 years ago