aizawa
cerberus
aizawa | cerberus | |
---|---|---|
1 | 3 | |
49 | 21 | |
- | - | |
6.6 | 10.0 | |
about 1 month ago | over 1 year ago | |
Python | Python | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
aizawa
cerberus
What are some alternatives?
DevBrute - DevBrute is a versatile password brute forcing tool designed to tackle a wide range of Social Media accounts and Web Applications. With its robust capabilities, it's adept at breaking through various security barriers.
STEWS - A Security Tool for Enumerating WebSockets
dosbomb - dosbomb ia a dos tool that cuts off targets or surrounding infrastructure in a flood of Internet traffic
GETreqt-Multithreaded-Slow-DoS-Attack - A unique, multithreaded Slow DoS exploit against web servers that use vulnerable versions of thread-based web server software (Apache 1.x, Apache 2.x, httpd, etc.); and is effective against even some mitigation mechanisms such as poorly implemented reverse proxy servers.
Mitigating-Web-Shells - Guidance for mitigation web shells. #nsacyber
seclook - Automatic security lookups from your clipboard
OSTE-Vulnerable-Web-Application - Vulnerable Web application made with PHP/SQL designed to help new web testers gain some experience and test DAST tools for identifying web vulnerabilities. Containing some of the most well-known vulnerabilities such as SQL, cross-site scripting (XSS), OS command injections, our intention to expand more vulnerabilities for learning purposes.
requests-ip-rotator - A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.
Villain - Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).
ccat - Cisco Config Analysis Tool
Deep-Inside - Command line tool that allows you to explore IoT devices by using Shodan API.
Heartbleed - Heartbleed vulnerability exploited 🩸