sfaci / mascLinks
A Web Malware Scanner
☆97Updated 3 years ago
Alternatives and similar repositories for masc
Users that are interested in masc are comparing it to the libraries listed below
Sorting:
- Real Time Threat Monitoring Tool☆113Updated 3 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 4 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Updated 7 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆80Updated 3 years ago
- WhiteBox CMS analysis☆68Updated 2 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 7 years ago
- Automated Pentest Tools Designed For Parrot Linux☆84Updated 6 years ago
- BackdoorMan is a toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination.☆76Updated 3 years ago
- Check if a IP is from tor or is a malicious proxy☆57Updated 4 years ago
- A Report Generation Tool for Security Assessment☆65Updated 7 years ago
- A web application for generating custom XSS payloads☆77Updated 6 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla, Drupal or Prestashop☆111Updated 7 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- The goal of this program is to quickly pull and install repos from its list☆41Updated 3 years ago
- Vulnerability scanner based on vulners.com audit API☆65Updated 7 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Updated 6 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆123Updated 2 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 7 years ago
- Program to perform vulnerability analysis and automatically generate a report☆57Updated 3 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- Automated Tactics Techniques & Procedures☆259Updated 2 years ago
- Extensible Red Team Framework☆112Updated 6 years ago
- ☆66Updated 7 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆150Updated 7 years ago
- ☆41Updated 8 years ago
- Linux Privilege Escalation Tool☆185Updated 6 years ago
- Using IPv6 to Bypass Security☆92Updated 4 months ago