xaitax / SploitScan
SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.
☆961Updated last month
Alternatives and similar repositories for SploitScan:
Users that are interested in SploitScan are comparing it to the libraries listed below
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆492Updated 3 months ago
- A simple tool for bypassing file upload restrictions.☆809Updated 5 months ago
- ☆310Updated 9 months ago
- Nmap Dashboard Mini Project☆562Updated 7 months ago
- Script for generating revshells☆457Updated 4 months ago
- Invisible network protocol sniffer☆747Updated 4 months ago
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆997Updated last week
- A RedTeam Toolkit☆390Updated 2 months ago
- OffSec OSINT Pentest/RedTeam Tools☆874Updated this week
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆271Updated last week
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆492Updated 3 weeks ago
- NucleiFuzzer is a robust automation tool designed for efficiently detecting web application vulnerabilities, including XSS, SQLi, SSRF, a…☆1,400Updated this week
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,858Updated this week
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆293Updated last year
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆812Updated last year
- HTTP 403 bypass tool☆476Updated 10 months ago
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆907Updated last month
- Generates millions of keyword-based password mutations in seconds.☆1,244Updated 5 months ago
- An XSS exploitation command-line interface and payload generator.☆1,284Updated 2 weeks ago
- Sticky notes for pentesting, bug bounty, CTF.☆642Updated last week
- how to look for Leaked Credentials !☆752Updated 8 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆239Updated 4 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆345Updated last year
- Offensive Security OSCP, OSWP, OSEP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA Exam and Lab Reporting / Note-Taking Tool☆747Updated 8 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆834Updated this week
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆572Updated 9 months ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆554Updated 2 months ago
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆1,578Updated this week
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,072Updated 5 months ago