1C RAS Offensive Security Tool
☆28Oct 4, 2023Updated 2 years ago
Alternatives and similar repositories for rasoff
Users that are interested in rasoff are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Public OCI-Image (docker image) Security Checker☆21Feb 16, 2026Updated 2 months ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- exfiltration/infiltration toolkit☆50Oct 31, 2024Updated last year
- BugBounty Hub: Your one-stop destination for Bug Bounty excellence! Explore Nuclei Templates and BugBounty Worldlists for comprehensive …☆16Apr 3, 2025Updated last year
- About PIVOting☆13Dec 19, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Check bitrix vulnerabilities☆94Jan 22, 2024Updated 2 years ago
- 1C Exploit Kit☆82Dec 8, 2021Updated 4 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 4 years ago
- Social Enggenering Toolkit (Hack Cam & Location Tracking with gps)☆24Feb 4, 2026Updated 3 months ago
- This Russia Doesn't Exist☆14Feb 21, 2024Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30May 7, 2024Updated last year
- karma WiFi attack implementation☆56Oct 23, 2024Updated last year
- SneakPeeker is a tool for finding and removing Canary tokens.☆15Dec 20, 2024Updated last year
- ☆26Jan 7, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Unauthenticated Remote Code Execution via Angular-Base64-Upload Library☆26Jul 12, 2025Updated 9 months ago
- medium interaction postgresql honeypot☆12Aug 6, 2024Updated last year
- Bruteforces Fortinet SSL VPNs☆58Sep 19, 2023Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated 2 years ago
- A tool for analyzing vulnerabilities in JWT tokens. Advanced JWT Vulnerability Scanner & Exploitation Toolkit☆42Nov 24, 2025Updated 5 months ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- Epyon is a swiss army knife tool for pentesting DevOps ecosystems.☆90Mar 13, 2026Updated last month
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Finding secrets in various (non-text) popular files.☆55Oct 21, 2025Updated 6 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆138Jan 22, 2025Updated last year
- ☆38Dec 14, 2024Updated last year
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆155May 17, 2024Updated last year
- D-Link NAS CVE-2024-3273 Exploit Tool☆99Apr 7, 2024Updated 2 years ago
- Nmap script to check vulnerability CVE-2021-21975☆27Apr 2, 2021Updated 5 years ago
- Generate reverse shells in command line with Go !☆21Aug 9, 2020Updated 5 years ago
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆184Apr 20, 2026Updated 2 weeks ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆18Apr 27, 2026Updated last week
- ☆13Sep 15, 2024Updated last year
- An interactive bash script for detecting IDOR vulnerabilities. Automates the discovery of access control issues in web applications, enha…☆15Apr 10, 2025Updated last year
- Proof of Concept Exploit for CVE-2024-9464☆44Oct 9, 2024Updated last year
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- ☆18Apr 9, 2024Updated 2 years ago
- Ask ChatGPT directly from the Chrome address bar (omnibox)☆10Mar 23, 2023Updated 3 years ago