A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network configurations across your infrastructure.
☆44Apr 23, 2026Updated 2 weeks ago
Alternatives and similar repositories for zscan
Users that are interested in zscan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 8 months ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆30Nov 26, 2025Updated 5 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 6 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆42May 7, 2023Updated 3 years ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆47Aug 5, 2025Updated 9 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆13Sep 8, 2024Updated last year
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated last year
- BlueSky OSINT Tool☆15Dec 10, 2024Updated last year
- ☆24Mar 4, 2025Updated last year
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆78Sep 1, 2025Updated 8 months ago
- ☆89Feb 12, 2025Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆100Apr 2, 2025Updated last year
- (Unofficial) Python API for http://checkusernames.com☆13Jan 15, 2015Updated 11 years ago
- Security tool against dependency typosquatting attacks☆56Updated this week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Some Of Huawei Routers Exploits☆15Sep 1, 2016Updated 9 years ago
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆105Dec 2, 2024Updated last year
- ☆17Oct 5, 2014Updated 11 years ago
- The official website for The Discord Analytics for Risks & Threats Project.☆23Dec 29, 2025Updated 4 months ago
- ☆17Apr 28, 2026Updated last week
- ar-go-tools (Argot) is a collection of analysis tools for Go☆47Mar 17, 2026Updated last month
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- Protection against HTML smuggling attacks.☆102Jul 10, 2025Updated 10 months ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆53Mar 29, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆10May 12, 2017Updated 8 years ago
- Very Easy Relative Backdoor Application☆14Jun 8, 2021Updated 4 years ago
- Homo Network - The best ddos botnet in 2023☆13Apr 27, 2023Updated 3 years ago
- An automated GitHub Actions-based crawler that fetches and updates public scopes from popular bug bounty platforms (like Hackerone/Bugcro…☆79Updated this week
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆42Dec 12, 2024Updated last year
- My Privacy DNS #Matrix lists for blacklisting☆149Jan 4, 2026Updated 4 months ago
- Quickly query the AWS IP Ranges☆85Apr 23, 2026Updated 2 weeks ago
- eBPF Memory Dump Tool☆104Apr 13, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Unauthenticated enumeration of AWS IAM Roles.☆26Apr 18, 2026Updated 3 weeks ago
- Peer to Peer botnet☆13Aug 7, 2020Updated 5 years ago
- ☆12Aug 29, 2024Updated last year
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- A simple example of botnet using IPFS and IPNS protocols as way for controller of botnet☆17May 4, 2018Updated 8 years ago
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆71Apr 30, 2026Updated last week