Subgraph Vega
☆364Feb 23, 2021Updated 5 years ago
Alternatives and similar repositories for Vega
Users that are interested in Vega are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- w3af: web application attack and audit framework, the open source web vulnerability scanner.☆4,864Feb 22, 2023Updated 3 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- Web Application Security Scanner Framework☆4,017May 22, 2025Updated 10 months ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Feb 12, 2015Updated 11 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- GoLismero - The Web Knife☆888Nov 3, 2020Updated 5 years ago
- Network Infrastructure Penetration Testing Tool☆1,669Jun 2, 2021Updated 4 years ago
- Nikto web server scanner☆10,279Updated this week
- Multithreaded SQL union bruteforcer☆16Sep 9, 2011Updated 14 years ago
- Web application security scanner created by lcamtuf for google - Unofficial Mirror☆855Feb 18, 2023Updated 3 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- OWASP WebScarab☆615Aug 13, 2021Updated 4 years ago
- OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework.☆543Jun 7, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Simple (web-) application vulnerability management system☆21Aug 14, 2014Updated 11 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Nov 4, 2014Updated 11 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Login Area Finder: scans host/s for login panels☆14Sep 21, 2014Updated 11 years ago
- WAF Exploitation Framework☆13Aug 25, 2023Updated 2 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆69Oct 3, 2013Updated 12 years ago
- Atmel MARC4 disassembler☆16Mar 29, 2013Updated 13 years ago
- [DON'T USE ME] plain ol' web apps scanner☆150Sep 14, 2016Updated 9 years ago
- Security scanner tool for Plone CMS.☆19May 14, 2012Updated 13 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆13May 30, 2017Updated 8 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- Automated All-in-One OS Command Injection Exploitation Tool☆5,704Updated this week
- The ZAP by Checkmarx Core project☆14,995Updated this week
- An ARP based Operating System version scanner☆14Jan 21, 2013Updated 13 years ago
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago
- Open Source Vulnerability Management Platform☆6,330Apr 10, 2026Updated last week
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- Dradis Framework: Collaboration and reporting for IT Security teams☆794Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Web application fuzzer☆6,466Jan 21, 2026Updated 2 months ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Dec 9, 2015Updated 10 years ago
- Library to parse and load EXIF (JPEG) image files and meta data, and redact the images for privacy.☆17Mar 31, 2012Updated 14 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Sep 20, 2014Updated 11 years ago
- A utility to perform dictionary attacks against the VoIP SIP Register hash☆14Mar 16, 2016Updated 10 years ago