A modular exploitation framework extensible with Lua
☆63Mar 10, 2025Updated last year
Alternatives and similar repositories for Venera
Users that are interested in Venera are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Mar 1, 2024Updated 2 years ago
- Store and retrieve encrypted secrets with PowerShell on Windows, Linux, or MacOS and also from KeePass 2 databases on Windows☆34Mar 4, 2026Updated 3 weeks ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- A tool which helps identifying client-side prototype polluting libraries☆39May 1, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A tech enumeration toolkit focused on 404 Not found pages.☆27Oct 6, 2024Updated last year
- backdoor exploit for vsftpd 2.3.4 on python☆16Oct 14, 2023Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- an exploit of Server-side request forgery (SSRF)☆53Aug 2, 2024Updated last year
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 2 months ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Aug 1, 2023Updated 2 years ago
- seCureLI is a tool that enables you to experience the delight of building products by helping you get ideas from your head into working s…☆28Jul 15, 2024Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Jul 2, 2025Updated 8 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Dump Windows SAM hashes☆42Aug 9, 2023Updated 2 years ago
- ☆29Jan 19, 2026Updated 2 months ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆104Jul 22, 2025Updated 8 months ago
- Light-weight web security scanner☆149Nov 22, 2025Updated 4 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- Encoder PHP webshell to bypass WAF using XOR operations.☆55Aug 2, 2023Updated 2 years ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Mar 25, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- Origin IP scanning utility developed with ChatGPT☆69Jun 21, 2023Updated 2 years ago
- A Firefox Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆27Dec 9, 2024Updated last year
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆159Jul 10, 2025Updated 8 months ago
- Retrieve all mails of users related to a git repository, a git user or a git organization☆57May 1, 2024Updated last year
- SQLI labs to test error based, Blind boolean based, Time based.☆17Feb 1, 2019Updated 7 years ago
- Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)☆11Jan 22, 2025Updated last year
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆70Sep 25, 2023Updated 2 years ago
- A Binary Ninja plugin that automatically resolves type information for EFI protocol usage.☆37Jul 25, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Clientside vulnerability / reflected xss fuzzer☆149Jul 29, 2023Updated 2 years ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆247Mar 19, 2024Updated 2 years ago
- Tool to scan servers and hosts using dynamic paths.☆21Oct 1, 2025Updated 5 months ago
- find dangling domains in a multi cloud environment☆176Dec 25, 2025Updated 3 months ago
- A fast network scanning tool to detect open ports and security vulnerabilities (Compatible with Debian & Red Hat OS)☆126Sep 6, 2025Updated 6 months ago
- This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sub…☆87Feb 14, 2026Updated last month
- NailaoLoader: Hiding Execution Flow via Patching☆23Feb 27, 2025Updated last year