Web Vulnerability Scanner.
☆13Mar 30, 2022Updated 3 years ago
Alternatives and similar repositories for topscan
Users that are interested in topscan are comparing it to the libraries listed below
Sorting:
- Find hidden directories from domain and subdomain.☆11Mar 27, 2022Updated 3 years ago
- Automatic Web Vulnerability Scanner.☆44Mar 30, 2022Updated 3 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆33Dec 18, 2019Updated 6 years ago
- Linux installer stuffs☆11Aug 7, 2025Updated 7 months ago
- Massive Vulnerability scanner☆12Mar 20, 2022Updated 3 years ago
- A small Go program to read /var/log/audit/audit.log☆14Nov 12, 2018Updated 7 years ago
- Multifunctional open redirection vulnerability scanner.☆30May 6, 2022Updated 3 years ago
- This tool is used to send mail anonmously.☆14Sep 25, 2023Updated 2 years ago
- Compare the given environment variable value across all the processes☆16Dec 5, 2024Updated last year
- ☆19Apr 10, 2021Updated 4 years ago
- Advanced deauthentication script.☆22Dec 17, 2019Updated 6 years ago
- Sends a verify code to your email from microsoft☆13Aug 17, 2025Updated 6 months ago
- An account hacking program with some built-in action keywords.☆14Apr 1, 2021Updated 4 years ago
- GitHubUserDataExtractor is a cross-platform Python tool designed to extract and display public GitHub user data both in the terminal and …☆22Sep 11, 2025Updated 5 months ago
- Multi-functional Web Recon & Vulnerability Scanner Tool☆35May 2, 2022Updated 3 years ago
- ALAT TOLL KEPERLUAN ONLINE☆13Jan 10, 2019Updated 7 years ago
- scrap email from instagram user followers☆12Jul 21, 2023Updated 2 years ago
- ☆11Apr 18, 2022Updated 3 years ago
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- This repository demonstrates a PHP-based technique for retrieving someone's IP address by disguising it as an image using MOD re-write. I…☆16May 3, 2024Updated last year
- Advanced payload generetor and multi handler☆37Dec 20, 2020Updated 5 years ago
- KaliAI is an advanced AI assistant designed to help security professionals and ethical hackers leverage Kali Linux tools effectively and …☆23Mar 25, 2025Updated 11 months ago
- This code repository contains a collection of Python scripts for classifying autistic and control conditions using Support Vector Machin…☆12Nov 1, 2023Updated 2 years ago
- Remake Of The USB Rubber Ducky In Python With Better Features. Steals IPv4+IPv6 And Other IPs, And Browsing History From: Brave, Microsof…☆14Oct 5, 2024Updated last year
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆35Jan 18, 2026Updated last month
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago
- Before using Emagnet, please remember that with great power comes great responsibility.☆22Mar 30, 2025Updated 11 months ago
- A compilation of docker-compose recipes, for self-hosted applications and services.☆12Jun 19, 2025Updated 8 months ago
- Check Snapchat Username Availability☆51Jan 30, 2023Updated 3 years ago
- automatically crawl every URL and find cross site scripting (XSS)☆41Mar 22, 2022Updated 3 years ago
- DirAttack tools, Search file or directory on website☆50Nov 7, 2019Updated 6 years ago
- SPAM filter rules for Stalwart Mail Server☆14Dec 16, 2025Updated 2 months ago
- Run the iproyal(pawns) client as a container on the Linux platform (ways to earn extra)☆11Aug 31, 2023Updated 2 years ago
- Scrapper bot Telegram. Scan credit card format and forward it to your channel☆11Nov 30, 2024Updated last year
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- Simple script to bulk check if IPs match networks☆11Jan 11, 2022Updated 4 years ago
- Small bash script for Android to enable adb (android debugging bridge) over WiFi.☆12Oct 29, 2017Updated 8 years ago
- This project was created to quickly launch a php application with all the necessary settings and extensions.☆10Jul 2, 2022Updated 3 years ago
- This was made with the intention of providing evidence of work done towards furthering education in cyber security.☆10May 12, 2022Updated 3 years ago