whitespots / fast-security-scannersView external linksLinks
Security checks for your researches
☆34Nov 22, 2020Updated 5 years ago
Alternatives and similar repositories for fast-security-scanners
Users that are interested in fast-security-scanners are comparing it to the libraries listed below
Sorting:
- PoC List☆10Sep 4, 2022Updated 3 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- powershell tool for VM evasion☆41Oct 2, 2020Updated 5 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- Reconnaisance Tool☆12Jun 4, 2020Updated 5 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆32Oct 11, 2020Updated 5 years ago
- Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)☆36Dec 23, 2019Updated 6 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆33Aug 26, 2021Updated 4 years ago
- Exploration project to invoke syscalls in arbitrary unix processes with ptrace.☆21Jun 14, 2023Updated 2 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 5 years ago
- Program for fuzzing parameters web application☆15Apr 14, 2025Updated 10 months ago
- automated password spraying tool☆148Jun 15, 2021Updated 4 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- my goto docker image when playing ctfs with all the tools I need☆21Jan 29, 2026Updated 2 weeks ago
- Perform vulnerabilities lookup on Vulners, the largest vulnerabilities & exploits database☆17Dec 8, 2019Updated 6 years ago
- Service-Now Article Bruteforcer☆16Jun 5, 2020Updated 5 years ago
- ☆46Mar 20, 2021Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Sep 25, 2020Updated 5 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Aug 11, 2021Updated 4 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 4 years ago
- #crypto #cipher #encode #decode #hash☆52Mar 27, 2021Updated 4 years ago
- Ansible playbooks that will without any user interaction provision Check Point Security Management server (SM) or Multi-Domain Management…☆11Jan 28, 2022Updated 4 years ago
- EPH is a tool which allows you to perform scans to find exposed administration panels that can lead to security vulnerabilities.☆19Jul 17, 2022Updated 3 years ago
- privilege escalation POCs built in Rust.☆19Jun 30, 2022Updated 3 years ago
- Machine Learning Hyperparameter Optimizer App (Streamlit + Scikit-learn + Python)☆21Nov 29, 2021Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 4 years ago
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆214Jun 23, 2020Updated 5 years ago
- Amazingly fast response crawler to find juicy stuff in the source code! 😎🔥☆155Sep 18, 2023Updated 2 years ago
- A penetration testing and vulnerability management application written using the powerful django framework.☆30Nov 22, 2023Updated 2 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Sep 6, 2023Updated 2 years ago