1C RAS Offensive Security Tool
☆28Oct 4, 2023Updated 2 years ago
Alternatives and similar repositories for rasoff
Users that are interested in rasoff are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Public OCI-Image (docker image) Security Checker☆21Feb 16, 2026Updated last month
- The OWApp Benchmark: an OWASP-compliant Vulnerable Android App Dataset☆44Apr 15, 2025Updated 11 months ago
- exfiltration/infiltration toolkit☆50Oct 31, 2024Updated last year
- BugBounty Hub: Your one-stop destination for Bug Bounty excellence! Explore Nuclei Templates and BugBounty Worldlists for comprehensive …☆16Apr 3, 2025Updated 11 months ago
- About PIVOting☆13Dec 19, 2023Updated 2 years ago
- Check bitrix vulnerabilities☆92Jan 22, 2024Updated 2 years ago
- It's my solution for bugbounty automation☆22Feb 24, 2026Updated last month
- Useful collection of scapy-scripts and more☆32Jun 23, 2024Updated last year
- 1C Exploit Kit☆79Dec 8, 2021Updated 4 years ago
- ☆20Sep 24, 2025Updated 6 months ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 4 years ago
- This Russia Doesn't Exist☆14Feb 21, 2024Updated 2 years ago
- Social Enggenering Toolkit (Hack Cam & Location Tracking with gps)☆20Feb 4, 2026Updated last month
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30May 7, 2024Updated last year
- karma WiFi attack implementation☆56Oct 23, 2024Updated last year
- SneakPeeker is a tool for finding and removing Canary tokens.☆15Dec 20, 2024Updated last year
- ☆26Jan 7, 2024Updated 2 years ago
- Unauthenticated Remote Code Execution via Angular-Base64-Upload Library☆26Jul 12, 2025Updated 8 months ago
- Advanced Hunting Queries☆20Updated this week
- Ядро "1С-Битрикс24" Корпоративный портал☆40Jan 2, 2026Updated 2 months ago
- Bruteforces Fortinet SSL VPNs☆58Sep 19, 2023Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- Finding secrets in various (non-text) popular files.☆53Oct 21, 2025Updated 5 months ago
- A tool for analyzing vulnerabilities in JWT tokens. Advanced JWT Vulnerability Scanner & Exploitation Toolkit☆43Nov 24, 2025Updated 4 months ago
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated 2 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- ☆13Dec 30, 2024Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆137Jan 22, 2025Updated last year
- ☆38Dec 14, 2024Updated last year
- D-Link NAS CVE-2024-3273 Exploit Tool☆99Apr 7, 2024Updated last year
- Nmap script to check vulnerability CVE-2021-21975☆27Apr 2, 2021Updated 4 years ago
- Generate reverse shells in command line with Go !☆20Aug 9, 2020Updated 5 years ago
- ☆16Jan 23, 2026Updated 2 months ago
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆42Oct 30, 2024Updated last year
- An interactive bash script for detecting IDOR vulnerabilities. Automates the discovery of access control issues in web applications, enha…☆15Apr 10, 2025Updated 11 months ago
- Proof of Concept Exploit for CVE-2024-9464☆44Oct 9, 2024Updated last year
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- Ask ChatGPT directly from the Chrome address bar (omnibox)☆10Mar 23, 2023Updated 3 years ago