xaitax / SploitScanLinks
SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.
☆1,162Updated 4 months ago
Alternatives and similar repositories for SploitScan
Users that are interested in SploitScan are comparing it to the libraries listed below
Sorting:
- secator - the pentester's swiss knife☆1,141Updated last week
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆643Updated 4 months ago
- Nmap Dashboard Mini Project☆616Updated last year
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,237Updated last year
- Pentesting automation platform that combines hacking tools to complete assessments☆509Updated last week
- ☆314Updated last year
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆867Updated last year
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆2,141Updated last week
- A simple tool for bypassing file upload restrictions.☆876Updated last year
- AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.☆689Updated 4 months ago
- HTTP 403 bypass tool☆534Updated last year
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆531Updated last week
- Sticky notes for pentesting, bug bounty, CTF.☆726Updated last month
- An XSS exploitation command-line interface and payload generator.☆1,392Updated 7 months ago
- Shodan Dorks☆444Updated 7 months ago
- Network Security Sniffer☆814Updated last month
- A fast WordPress plugin enumeration tool☆683Updated last month
- All-in-One Toolkit for BruteForce Attacks☆871Updated 11 months ago
- Generates millions of keyword-based password mutations in seconds.☆1,348Updated 3 months ago
- Header Exploitation HTTP☆633Updated 2 months ago
- Script for generating revshells☆476Updated last year
- how to look for Leaked Credentials !☆982Updated last year
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆708Updated last year
- ☆675Updated last year
- The useful exploit finder☆811Updated last year
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆755Updated 8 months ago
- Uncover the true IP address of websites safeguarded by Cloudflare & Others☆1,914Updated 4 months ago
- Collection of knowledge about information security☆646Updated this week
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆623Updated 10 months ago
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆1,001Updated 5 months ago