scscanner is tool to read website status code response from the lists.
☆39May 27, 2023Updated 2 years ago
Alternatives and similar repositories for scscanner_sh
Users that are interested in scscanner_sh are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- A Web Vulnerability Scanner and Patcher☆171Feb 14, 2026Updated last month
- Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at once☆48Aug 19, 2021Updated 4 years ago
- D3Ext's Forward Shell☆120Oct 15, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)☆11Apr 15, 2022Updated 3 years ago
- Advanced Admin Finder Tool. More Than 800+ Admin Finder Dorks🔥☆13May 9, 2021Updated 4 years ago
- Uses python3.10, Debian, python-Nmap, OpenaAI, and flask framework to create a Nmap API that can do scans with a good speed online and is…☆80Jan 22, 2025Updated last year
- A simple bash script for Web Cache Deception exploitation.☆16Oct 7, 2024Updated last year
- A simple injector that uses LoadLibraryA☆18Jun 14, 2020Updated 5 years ago
- Domain Availability Checker☆181Jul 24, 2025Updated 8 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 3 years ago
- SCodeScanner stands for Source Code scanner where the user can scans the source code for finding the Critical Vulnerabilities.☆162Jul 17, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Sep 6, 2023Updated 2 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Oct 30, 2023Updated 2 years ago
- Memory searching utilities☆43Nov 11, 2013Updated 12 years ago
- REST-Attacker is designed as a proof-of-concept for the feasibility of testing generic real-world REST implementations. Its goal is to pr…☆79Jan 9, 2023Updated 3 years ago
- ☆132Jan 25, 2023Updated 3 years ago
- 一个简单的批量url存活检测工具☆25Jun 11, 2021Updated 4 years ago
- Site fast fuzzing with chorme extension.☆24Feb 4, 2022Updated 4 years ago
- Ultra-lightweight HTTP file server for directory browsing and local development☆45Oct 11, 2025Updated 5 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Tool to parse SRU database☆25Mar 1, 2018Updated 8 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆100Oct 27, 2024Updated last year
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embed…☆105Dec 8, 2025Updated 3 months ago
- Metabase Pre-auth RCE (CVE-2023-38646)!!☆15Jul 29, 2023Updated 2 years ago
- Neton is a tool for getting information from Internet connected sandboxes☆98Nov 15, 2022Updated 3 years ago
- ☆31Aug 21, 2022Updated 3 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Mar 20, 2026Updated last week
- (Windows/Linux/Mac) Remote Administration Tool☆67Feb 28, 2021Updated 5 years ago
- Modular framework to exploit UPS devices☆65Mar 1, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆39Oct 6, 2021Updated 4 years ago
- Linux x86_64 Process Injection Utility☆59Mar 9, 2021Updated 5 years ago
- Vulnerability Research and Proof of Concept exploits for various targets☆35Jan 4, 2023Updated 3 years ago
- Reportly is an AzureAD user activity report tool.☆96Aug 14, 2023Updated 2 years ago
- A dictionary and a set that offer very fast read speed in expense of slow write speed. Ideal in situations where the collection is infreq…☆12Mar 17, 2026Updated last week
- Go script to guess an API key / OAuth token found during pentest. CLI version of https://github.com/daffainfo/apiguesser-web/☆45Aug 28, 2022Updated 3 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Feb 6, 2023Updated 3 years ago