Security checks for your researches
☆34Nov 22, 2020Updated 5 years ago
Alternatives and similar repositories for fast-security-scanners
Users that are interested in fast-security-scanners are comparing it to the libraries listed below
Sorting:
- PoC List☆10Sep 4, 2022Updated 3 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- Reconnaisance Tool☆12Jun 4, 2020Updated 5 years ago
- Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)☆36Dec 23, 2019Updated 6 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆34Aug 26, 2021Updated 4 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- Program for fuzzing parameters web application☆15Apr 14, 2025Updated 10 months ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- my goto docker image when playing ctfs with all the tools I need☆21Mar 2, 2026Updated last week
- Perform vulnerabilities lookup on Vulners, the largest vulnerabilities & exploits database☆17Dec 8, 2019Updated 6 years ago
- Service-Now Article Bruteforcer☆16Jun 5, 2020Updated 5 years ago
- ☆46Mar 20, 2021Updated 4 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Aug 11, 2021Updated 4 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Sep 25, 2020Updated 5 years ago
- #crypto #cipher #encode #decode #hash☆52Mar 27, 2021Updated 4 years ago
- Ansible playbooks that will without any user interaction provision Check Point Security Management server (SM) or Multi-Domain Management…☆11Jan 28, 2022Updated 4 years ago
- privilege escalation POCs built in Rust.☆19Jun 30, 2022Updated 3 years ago
- Machine Learning Hyperparameter Optimizer App (Streamlit + Scikit-learn + Python)☆21Nov 29, 2021Updated 4 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- EPH is a tool which allows you to perform scans to find exposed administration panels that can lead to security vulnerabilities.☆20Jul 17, 2022Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 4 years ago
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆213Jun 23, 2020Updated 5 years ago
- Amazingly fast response crawler to find juicy stuff in the source code! 😎🔥☆156Sep 18, 2023Updated 2 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Sep 6, 2023Updated 2 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- ddos-checker is a tool used to perform a test on a website from a DDOS attack to find security gaps in a website.☆11Oct 16, 2025Updated 4 months ago
- ☆11Sep 26, 2021Updated 4 years ago
- Golang workshop conducted at Singapore Management University☆10Mar 16, 2020Updated 5 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- Password and email checker. It is your password or email compromissed? Check it now!☆11Dec 8, 2022Updated 3 years ago