Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers
☆102Apr 8, 2026Updated this week
Alternatives and similar repositories for secutils
Users that are interested in secutils are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- seCureLI is a tool that enables you to experience the delight of building products by helping you get ideas from your head into working s…☆28Jul 15, 2024Updated last year
- OXO is a security scanning orchestrator for the modern age.☆562Updated this week
- A Powerful Network Reconnaissance Tool for Security Professionals☆107Dec 29, 2024Updated last year
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Mar 1, 2024Updated 2 years ago
- Red Kite, the Extensible Attack Surface Management tool.☆89Feb 8, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Golang package for scanning private and public IPs for open TCP ports 👁️☆118Mar 13, 2025Updated last year
- Hastly written Tools & Scripts for Personal Use Cases & Bug Bounties☆81Mar 6, 2025Updated last year
- This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sub…☆87Feb 14, 2026Updated last month
- Set of tools to audit and exploit STUN/TURN servers☆34Dec 12, 2025Updated 4 months ago
- Customized CVE FEED Notifier☆112Apr 22, 2025Updated 11 months ago
- one-stop resource for all things offensive security.☆179Feb 21, 2026Updated last month
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆70Updated this week
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆276Jun 16, 2024Updated last year
- 😹 Python project to bruteforce Apache Tomcat manager login with known-default credentials☆99Mar 12, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆176Apr 23, 2025Updated 11 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 6 months ago
- Canary Detection☆194Oct 20, 2025Updated 5 months ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Feb 26, 2024Updated 2 years ago
- Efficient DevSecOps☆47Jun 30, 2025Updated 9 months ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Jun 9, 2021Updated 4 years ago
- Bluetooth Landscape Exploration & Enumeration Platform☆53Mar 4, 2026Updated last month
- Proviesec Fuzz Scanner - dir/path web scanner☆108Mar 29, 2026Updated 2 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Identify hardcoded secrets in static structured text (version 2)☆99Feb 5, 2025Updated last year
- Collection of cheat sheets useful for pentesting☆610Jun 27, 2024Updated last year
- A fast network scanning tool to detect open ports and security vulnerabilities (Compatible with Debian & Red Hat OS)☆126Sep 6, 2025Updated 7 months ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆330Aug 22, 2024Updated last year
- A simple touchID prompt'er for use in shell scripts.☆99Jun 18, 2024Updated last year
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆167Oct 28, 2025Updated 5 months ago
- Official Implementation of SFM and the baselines in Jax.☆21May 31, 2025Updated 10 months ago
- [Neural Networks] Dual-domain strip attention for image restoration☆82May 19, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Web Security Scanner☆382Nov 13, 2025Updated 4 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- Easily stand up Keycloak and SPIRE for testing AI Agents☆29Sep 18, 2025Updated 6 months ago
- Detect when your installed extensions have changed owners.☆632Feb 26, 2026Updated last month
- Security tool against dependency typosquatting attacks☆55Updated this week
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 2 months ago
- A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.☆359Apr 4, 2026Updated last week