A Target Tracking , NoteTaking , CheckLists and Data Management GUI App for Bug Hunter's and Pentesters.
☆42Jun 19, 2022Updated 3 years ago
Alternatives and similar repositories for Sandman
Users that are interested in Sandman are comparing it to the libraries listed below
Sorting:
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- A quick command line utility that generates uses simple addition to obfuscate individual characters, then executes it☆16Jun 13, 2025Updated 8 months ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- ☆19Mar 15, 2020Updated 5 years ago
- With StealthLink, you can easily create a convincing mask for your phishing URLs, making them indistinguishable from legitimate websites.…☆15Jan 16, 2024Updated 2 years ago
- ☆13Apr 30, 2016Updated 9 years ago
- URL scanner for recon, vulnerabilities, secrets and more!☆12Sep 27, 2021Updated 4 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- Blazing fast minimal web framework for the Go programming language.☆14Sep 16, 2015Updated 10 years ago
- giox is an extension to gioui☆15Jul 12, 2020Updated 5 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- A fast, powerful open-source password generator with hexagonal architecture. Features a zero-dependency core, Web UI demo, CLI tool, and …☆21Feb 9, 2026Updated 3 weeks ago
- ☆19Jan 24, 2022Updated 4 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆22Jan 6, 2026Updated last month
- Information Gathering Simplified.☆77Jan 17, 2023Updated 3 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Jan 16, 2020Updated 6 years ago
- Cross-platform, multi-server chat app built using Fyne☆35Oct 27, 2025Updated 4 months ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Oct 1, 2016Updated 9 years ago
- Electronic Document, Task, Project Management System for Teamwork☆22Nov 13, 2025Updated 3 months ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- An account hacking program with some built-in action keywords.☆14Apr 1, 2021Updated 4 years ago
- Sends a verify code to your email from microsoft☆13Aug 17, 2025Updated 6 months ago
- 🍅 Fynodoro, the Pomodoro Widget☆21Jan 25, 2026Updated last month
- A fully-featured REST API developed in Golang for an online book store.☆24Jan 26, 2024Updated 2 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆25Nov 18, 2025Updated 3 months ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Updated this week
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆26Jul 18, 2022Updated 3 years ago
- A penetration testing and vulnerability management application written using the powerful django framework.☆30Nov 22, 2023Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- Minimal web server enumeration & attack surface detection tool based on results of nmap.☆38Sep 24, 2024Updated last year
- ☆11Sep 26, 2021Updated 4 years ago
- Small and easy server for web-hooks to deploy software on push from gitlab/github/hg and so on☆10May 7, 2025Updated 9 months ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- ☆59Apr 8, 2021Updated 4 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- Python Script to Print the name of the companies that are acquired by a Target Company and the Time of Acquisition.☆26Dec 5, 2021Updated 4 years ago