zcyberseclab / zscan
A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network configurations across your infrastructure.
☆37Updated 2 months ago
Alternatives and similar repositories for zscan:
Users that are interested in zscan are comparing it to the libraries listed below
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆68Updated last week
- A Powerful Network Reconnaissance Tool for Security Professionals☆100Updated 3 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆37Updated 4 months ago
- Web Server Vulnerability Scanning Tool☆34Updated last month
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆14Updated 5 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆38Updated last year
- Burp Suite extension for testing Passkey systems.☆66Updated 2 weeks ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆81Updated 8 months ago
- Protection against HTML smuggling attacks.☆95Updated this week
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆134Updated 2 weeks ago
- Identify hardcoded secrets in static structured text (version 2)☆91Updated 2 months ago
- FrogPost: postMessage Security Testing Tool☆50Updated this week
- Putting a leash on naughty AWS permissions☆25Updated last week
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆73Updated last month
- Link Dumper is a powerful Python-based web crawler designed for pentesting and reconnaissance.☆46Updated last month
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆25Updated this week
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆14Updated 3 weeks ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆168Updated 10 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆100Updated 3 weeks ago
- ☆21Updated last month
- Addon for BHCE☆41Updated 2 weeks ago
- Autonomous AI C2☆30Updated 8 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆139Updated 3 months ago
- Stalker, the Extensible Attack Surface Management tool.☆83Updated last week
- Framework for Monitoring File Ingestion Source for Yara Matches☆46Updated last month
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆83Updated 2 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆105Updated 5 months ago
- Hijack a slack bot to phish your way in☆55Updated last week
- Dredging up secrets from the depths of the file system☆125Updated 5 months ago
- A collection of Turbo Intruder scripts.☆57Updated 2 months ago