A Target Tracking , NoteTaking , CheckLists and Data Management GUI App for Bug Hunter's and Pentesters.
☆42Jun 19, 2022Updated 3 years ago
Alternatives and similar repositories for Sandman
Users that are interested in Sandman are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- A simple cross-platform GUI app to remind you to take breaks when working on your computer. Using Go & Fyne.☆19Dec 18, 2024Updated last year
- port+dir+param bruteforcing at the same time using ffuf☆17Jul 27, 2024Updated last year
- URL scanner for recon, vulnerabilities, secrets and more!☆12Sep 27, 2021Updated 4 years ago
- KView is a standalone desktop application to interact with your Kubernetes cluster.☆12Apr 3, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- ☆19Mar 15, 2020Updated 6 years ago
- ☆59Apr 8, 2021Updated 4 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- A fast, powerful open-source password generator with hexagonal architecture. Features a zero-dependency core, Web UI demo, CLI tool, and …☆22Mar 13, 2026Updated last week
- 🍅 Fynodoro, the Pomodoro Widget☆21Mar 10, 2026Updated 2 weeks ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A command line utility and library for generating professional looking invoices in Go.☆16Feb 2, 2023Updated 3 years ago
- Web App Pen Tester (Web Interface)☆32Dec 6, 2022Updated 3 years ago
- With StealthLink, you can easily create a convincing mask for your phishing URLs, making them indistinguishable from legitimate websites.…☆15Jan 16, 2024Updated 2 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Information Gathering Simplified.☆83Jan 17, 2023Updated 3 years ago
- ☆13Jul 4, 2024Updated last year
- ☆16May 15, 2020Updated 5 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Feb 27, 2026Updated 3 weeks ago
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆26Jul 18, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Angular 2 code samples for the blog post Angular 2 Step by Step Your First Component http://www.barbarianmeetscoding.com/blog/2016/03/25/…☆15Oct 23, 2018Updated 7 years ago
- Service and Replication Controllers to run WSO2 products on Kubernetes with Docker☆14Nov 9, 2017Updated 8 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- Quickly review your photo folders, safely delete bad and similar shots, fix the shooting dates, crop and adjust photos☆41Dec 11, 2025Updated 3 months ago
- ☆13Apr 30, 2016Updated 9 years ago
- An account hacking program with some built-in action keywords.☆14Apr 1, 2021Updated 4 years ago
- Static and dynamic Android application security analysis☆76Jun 2, 2024Updated last year
- Minimal web server enumeration & attack surface detection tool based on results of nmap.☆38Sep 24, 2024Updated last year
- Sniper. Passive Secrets Hunting.🚬☆13Jun 3, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- 9menu-like launcher in Go☆17Apr 21, 2023Updated 2 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Updated this week
- Sends a verify code to your email from microsoft☆13Aug 17, 2025Updated 7 months ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Oct 1, 2016Updated 9 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆98Sep 27, 2021Updated 4 years ago
- Keystroke injection tool collection for 2.4 GHz wireless input devices☆24Oct 20, 2023Updated 2 years ago