0dayCTF / Autofill_DangerLinks
Autofill Phishing
☆85Updated 4 months ago
Alternatives and similar repositories for Autofill_Danger
Users that are interested in Autofill_Danger are comparing it to the libraries listed below
Sorting:
- Bookmarklet to find endpoints easily with one click☆72Updated last year
- capNcook - a dark web exploration tool☆85Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆177Updated last year
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆153Updated last month
- Turning smart lights into Wifi Hacking implants.☆167Updated 10 months ago
- Simple HTTP listener for security testing☆19Updated 3 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆344Updated last year
- BLE cha0s t00lkit xox☆62Updated last week
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆106Updated last year
- 🤖 The Modern Port Scanner 🤖☆20Updated 4 years ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆279Updated last year
- A python script to check printer across the world that allow printing on port 9100 trough pjl☆14Updated last year
- A Simple Discord Command and Control Client for Windows Machines using Powershell☆38Updated 2 months ago
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆34Updated 3 months ago
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆50Updated last year
- A Powerful Intruder written in Python☆21Updated 4 years ago
- This project is a server-side solution for seamless URL redirection when a QR code is scanned. It redirects users to a specified URL and …☆17Updated 4 months ago
- Analyze your tryhackme progress!☆12Updated last year
- A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.☆87Updated 7 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆99Updated 2 years ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆258Updated 8 months ago
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. …☆52Updated last year
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻☆21Updated 6 years ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆38Updated last year
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆52Updated last year
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆131Updated last year
- WiFi Rubber Ducky with a web interface using CircuitPython☆116Updated 2 months ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆226Updated 2 years ago
- capNcook - a dark web exploration tool☆118Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆136Updated last year