xaitax / SploitScanLinks
SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.
☆1,160Updated 5 months ago
Alternatives and similar repositories for SploitScan
Users that are interested in SploitScan are comparing it to the libraries listed below
Sorting:
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆645Updated 4 months ago
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,255Updated last year
- HTTP 403 bypass tool☆539Updated last year
- A simple tool for bypassing file upload restrictions.☆879Updated last year
- ☆314Updated last year
- Generates millions of keyword-based password mutations in seconds.☆1,359Updated 3 months ago
- Nmap Dashboard Mini Project☆619Updated last year
- secator - the pentester's swiss knife☆1,150Updated 2 weeks ago
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆870Updated last year
- Shodan Dorks☆450Updated 7 months ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆708Updated last year
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,713Updated last month
- how to look for Leaked Credentials !☆985Updated last year
- Header Exploitation HTTP☆644Updated last week
- Network Security Sniffer☆818Updated last month
- Pentesting automation platform that combines hacking tools to complete assessments☆512Updated this week
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆674Updated 4 months ago
- An XSS exploitation command-line interface and payload generator.☆1,397Updated 8 months ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆627Updated this week
- AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.☆704Updated 5 months ago
- Script for generating revshells☆476Updated last year
- Sticky notes for pentesting, bug bounty, CTF.☆736Updated 2 months ago
- The useful exploit finder☆813Updated last year
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆758Updated 8 months ago
- Tool to find CVEs and Exploits.☆482Updated last year
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆720Updated last month
- All-in-One Toolkit for BruteForce Attacks☆892Updated last year
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆663Updated last year
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆960Updated last month
- ☆683Updated last year