Craxify Automated Reconnaissance Framework for Bug Bounty Hunters
☆19Apr 3, 2025Updated 11 months ago
Alternatives and similar repositories for craxify
Users that are interested in craxify are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Bash script for automated nuclei dast scanning by using passive urls☆123Mar 5, 2025Updated last year
- An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, …☆13Jun 24, 2025Updated 9 months ago
- Reconizer is all-in-one subdomain enumeration tool that has capabilities to find the maximum number of subdomains of a root domain.☆18Jul 14, 2024Updated last year
- ☆18Apr 26, 2025Updated 11 months ago
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆43Jan 29, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ReconX is a powerful and user-friendly reconnaissance tool designed for security researchers and penetration testers. It provides a compr…☆27Dec 24, 2024Updated last year
- N0aziXss Origin Recon 🍓☆23Dec 16, 2025Updated 3 months ago
- An insecure and inconsistent DLL injecting extra sensory perception for CS2 using ImGui-DirectX 11 Kiero Hook☆16Oct 27, 2024Updated last year
- Tutorials and Things to Do while Hunting Vulnerability.☆13Aug 30, 2022Updated 3 years ago
- Copy Breadcrumbs plugin for Visual Studio Code. Based on Scott Blair's extension.☆12Feb 3, 2025Updated last year
- Repository for Ludus french templates☆23Mar 1, 2026Updated 3 weeks ago
- Simple Python script that will set up a PHP server for stealing cookies - and provided the payload needed.☆40Jan 28, 2025Updated last year
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- BloodHound Automation: Collection, Analysis and Data Import☆19Nov 12, 2025Updated 4 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆10Oct 11, 2015Updated 10 years ago
- A JX3 DPS Simulation Tool based on .NET WPF☆15Aug 3, 2025Updated 7 months ago
- Create Terraform files using Python scripts.☆10Feb 5, 2022Updated 4 years ago
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆18Mar 6, 2025Updated last year
- using wnbios64.sys for arbitrary r/w☆15Oct 12, 2025Updated 5 months ago
- Archive des épreuves du FCSC 2022 en attendant une version officielle de l'ANSSI☆10Jun 11, 2022Updated 3 years ago
- Simplifying RAG with PostgreSQL and PGVector☆16Jul 31, 2024Updated last year
- A collection of awesome penetration testing resources, tools and other shiny things☆12Feb 15, 2021Updated 5 years ago
- angr-wrapper is a simple script to automatise and accelerate your basic use of angr (to solve CTF challenges for example)☆14Dec 18, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Educational tool for simulating Instagram login and 2FA mechanisms. Designed for ethical hacking and cybersecurity training.☆20Jul 29, 2025Updated 8 months ago
- slides, exercises, cheatsheet and instructions for my ROP-Workshop☆19Dec 27, 2019Updated 6 years ago
- Server and avi file to exploit FFmpeg HLS parse☆22Jun 26, 2019Updated 6 years ago
- 热门网络游戏辅助开发教程☆15Jan 7, 2021Updated 5 years ago
- All ROPemporium binaries categorized by architecture, with solving scripts and custom flags☆25May 21, 2023Updated 2 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- This is the open sourced code for the extension, EndPointer☆71Nov 8, 2024Updated last year
- DMA Cheat for Crossfire☆23Sep 20, 2025Updated 6 months ago
- Extension to log postMessage()☆15Feb 17, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Linux userland rootkit. Hides file and directory, hides process, hides bind shell port, hides daemon port, hides reverse shell port, clea…☆20Jan 15, 2026Updated 2 months ago
- 模拟按键精灵取色/识图 模拟玩家完成操作☆13Mar 25, 2019Updated 7 years ago
- Simplify AnyDesk log analysis by effortlessly searching, extracting, and generating reports on IP addresses and login dates.☆18May 31, 2024Updated last year
- Exploits made by me☆12Jan 13, 2023Updated 3 years ago
- Reverse shell generator☆23Oct 3, 2019Updated 6 years ago
- 剑网3 PakV5 解包程序源码☆24Feb 6, 2025Updated last year
- This is the open source version of vulnerable.codes platform.☆29Apr 17, 2025Updated 11 months ago