Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple static/dynamic scans
☆24Dec 16, 2022Updated 3 years ago
Alternatives and similar repositories for astam-correlator
Users that are interested in astam-correlator are comparing it to the libraries listed below
Sorting:
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated 11 months ago
- A framework for automating penetration testing using a plugin based architecture☆41May 20, 2022Updated 3 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 4 months ago
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- A simplex kernel-based keylogger written for fun, not evil.☆16Apr 3, 2018Updated 7 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- 超精简的POC扫描框架☆10Aug 5, 2019Updated 6 years ago
- WAF Cookie Fetcher is a Burp Suite extension written in Python, which uses a headless browser to obtain the values of WAF-injected cookie…☆16Jan 16, 2018Updated 8 years ago
- ☆87Mar 16, 2022Updated 3 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 8 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Minimal workflows☆20Mar 19, 2024Updated last year
- 分布式漏扫框架☆17Nov 7, 2017Updated 8 years ago
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆19May 26, 2021Updated 4 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Sep 24, 2021Updated 4 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated last month
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- Sqli-Scanner is a python3 script written to scan websites for SQL injection vulnerabilities Features 1 Scan one website 2 Scan multiple…☆23Nov 6, 2021Updated 4 years ago
- A small tool to find admin panel of the website☆20Nov 21, 2022Updated 3 years ago
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆26Aug 8, 2023Updated 2 years ago
- Scans plugins directory for possible vulnerable plugins.☆22Dec 9, 2023Updated 2 years ago
- An Advanced tool to scan hundreds of IP's in Seconds for CVE's, Open Ports And Web Technologies.☆22Apr 30, 2022Updated 3 years ago
- Quick and dirty .net console app for querying mssql servers.☆24Aug 30, 2018Updated 7 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Tools and scripts for penetration testing☆19Jun 28, 2020Updated 5 years ago
- XSS HTTP Inject0r is a proof of concept tool that shows how XSS (Cross Site Scripting) flags can be exploited easily. It is written in H…☆24Jul 23, 2014Updated 11 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Parse scan results into python objects, i.e. Nessus, Nmap, testssl, metasploit, ...☆23Jan 4, 2020Updated 6 years ago
- Reconnaissance tool of Penetration test & Bug Bounty☆25Aug 1, 2018Updated 7 years ago
- A Simple Console AnyDesk grabber, to ddos b!tches☆25Dec 14, 2025Updated 2 months ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆110Dec 17, 2023Updated 2 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Dec 9, 2016Updated 9 years ago