varppi / awacs-scannerView external linksLinks
Another vulnerability scanner
☆18Aug 9, 2025Updated 6 months ago
Alternatives and similar repositories for awacs-scanner
Users that are interested in awacs-scanner are comparing it to the libraries listed below
Sorting:
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- spring4shell | CVE-2022-22965☆23Jun 30, 2022Updated 3 years ago
- PHP lab to test captcha bypassing☆30Jan 8, 2024Updated 2 years ago
- The long shadow to emerge as other Git repositories☆18Jul 8, 2024Updated last year
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- delosNmap | Nmap Script☆38Jan 15, 2023Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21May 15, 2022Updated 3 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- 「💥」CVE-2022-26134 - Confluence Pre-Auth RCE☆14Jun 19, 2022Updated 3 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- A penetration testing and vulnerability management application written using the powerful django framework.☆30Nov 22, 2023Updated 2 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Command and Control Framework☆13Mar 23, 2024Updated last year
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- HOCig- Automatic HOC Information Gathering Tool V 1.0☆13Jan 17, 2020Updated 6 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- A simple PHP web backdoor allows you to retrieve directory/file contents and upload file(s) from the local machine or remote URL.☆20Sep 18, 2021Updated 4 years ago
- Extendable Python script handler for automating penetration testing.☆39Mar 3, 2023Updated 2 years ago
- Subscan is a simple tool for subdomain scanner, it can scan subdomains fast.☆38Aug 9, 2023Updated 2 years ago
- A fast, simple, and powerful open-source utility tool for generating strong, unique, and random passwords. The Password Generator support…☆21Feb 7, 2026Updated last week
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Jan 13, 2022Updated 4 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Jul 7, 2022Updated 3 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆40Oct 29, 2022Updated 3 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆43Aug 5, 2022Updated 3 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆22Jan 6, 2026Updated last month
- A Hacking and Pentesting Tool for Windows☆20Jul 17, 2025Updated 6 months ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Dec 20, 2025Updated last month
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 2 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆46Nov 16, 2020Updated 5 years ago
- Sifter - All purpose penetration testing op-center☆81Nov 23, 2022Updated 3 years ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago