0dayCTF / Autofill_DangerLinks
Autofill Phishing
☆72Updated 6 months ago
Alternatives and similar repositories for Autofill_Danger
Users that are interested in Autofill_Danger are comparing it to the libraries listed below
Sorting:
- capNcook - a dark web exploration tool☆71Updated last year
- Bookmarklet to find endpoints easily with one click☆58Updated last year
- Analyze your tryhackme progress!☆12Updated last year
- Simple HTTP listener for security testing☆16Updated 2 years ago
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆41Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆170Updated last year
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻☆20Updated 5 years ago
- Here are the most interesting Shodan dorks (according to me)☆81Updated last year
- Remake of CVE-2020-9484 by Pentestical☆20Updated 9 months ago
- A Powerful Intruder written in Python☆16Updated 3 years ago
- Turning smart lights into Wifi Hacking implants.☆123Updated 4 months ago
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆85Updated 10 months ago
- DarkGPT Lite is a specialized CLI tool providing unrestricted conversations with AI for cybersecurity research purposes☆20Updated last month
- capNcook - a dark web exploration tool☆101Updated 8 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆123Updated 9 months ago
- 🤖 The Modern Port Scanner 🤖☆19Updated 3 years ago
- To perform OSINT on an instagram profile☆75Updated 10 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 11 months ago
- A tool for automatically change the Tor IP address over time.☆88Updated 2 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 9 months ago
- Automate installation of extra pentest tools on Kali Linux☆57Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆49Updated 4 years ago
- Stuff about it-security that might be good to know☆23Updated 5 years ago
- POC | Steal user WhatsApp information/data☆65Updated last month
- Phone: A Mobile Phone Forensic Framework ( Android )☆201Updated 3 months ago
- CTF toolbox☆17Updated 4 years ago
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆93Updated last month
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆35Updated 11 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆95Updated last year
- notes and ramblings from my OSCP/PenTesting Studies☆90Updated last year