0dayCTF / Autofill_DangerLinks
Autofill Phishing
☆76Updated 3 weeks ago
Alternatives and similar repositories for Autofill_Danger
Users that are interested in Autofill_Danger are comparing it to the libraries listed below
Sorting:
- Bookmarklet to find endpoints easily with one click☆64Updated last year
- capNcook - a dark web exploration tool☆74Updated last year
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆131Updated this week
- capNcook - a dark web exploration tool☆111Updated 11 months ago
- Simple HTTP listener for security testing☆16Updated 2 years ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆176Updated last year
- Turning smart lights into Wifi Hacking implants.☆130Updated 7 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆314Updated last year
- Remake of CVE-2020-9484 by Pentestical☆19Updated last year
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆37Updated 4 months ago
- Here are the most interesting Shodan dorks (according to me)☆89Updated last year
- IoT Camera Reconnaissance and Live Viewer☆157Updated last year
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆278Updated last year
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆97Updated 2 years ago
- 🤖 The Modern Port Scanner 🤖☆19Updated 4 years ago
- What the name says....☆100Updated last year
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆37Updated last year
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻☆21Updated 5 years ago
- A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.☆80Updated 3 months ago
- Analyze your tryhackme progress!☆12Updated last year
- A python script that look for hikvision vulnerable cams with a backdoor☆23Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated last year
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆138Updated 8 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆125Updated last year
- A tool for automatically change the Tor IP address over time.☆96Updated 5 months ago
- track, trace, and take down with SCAMTRACK☆22Updated 3 weeks ago
- Views Instagram private account's media without login☆99Updated last week
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆94Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆153Updated 6 months ago
- Redirect All Traffic Through Tor Network For Kali Linux☆201Updated 5 months ago