0n1cOn3 / The-NSO-Blacklist
List of NSO Pegasus's C2C Servers where will be used to control Pegasus.
☆16Updated last year
Alternatives and similar repositories for The-NSO-Blacklist:
Users that are interested in The-NSO-Blacklist are comparing it to the libraries listed below
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆18Updated 7 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆20Updated 6 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 months ago
- DNS logging, detection, ...☆15Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- A crack 💥 version of Ghostify, that helps you view Instagram stories without a trace (the story owner won't know you saw their story!)☆7Updated 2 years ago
- Free Advance encryptor for Anon Cloud☆17Updated 2 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆11Updated last year
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated 2 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆16Updated last year
- This is a basic example of how to search into Shodan using the ShodanAPI.☆15Updated 11 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆34Updated 4 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆13Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Nexus of Android banking Trojans☆15Updated last year
- ☆14Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆15Updated 7 years ago
- Hashes of infamous malware☆25Updated last year
- Some useful scripts for CobaltStrike☆10Updated 6 years ago