A knockoff social-engineer toolkit
☆50Jun 3, 2021Updated 4 years ago
Alternatives and similar repositories for sedoppkit
Users that are interested in sedoppkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Short Programs For Spreading Malware☆16Aug 11, 2021Updated 4 years ago
- SQLiToolkit is a SQL injection Based Toolkit. There are many features such as Vulnerability Scanner, Url Fuzzer in this tool. This is a U…☆13Feb 8, 2022Updated 4 years ago
- Unified repository for different Metasploit Framework payloads☆22Oct 25, 2017Updated 8 years ago
- Ansible inventory script for Zabbix☆12Jan 26, 2018Updated 8 years ago
- ☆18Aug 1, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Gopher Find is a blazingly fast alternative to Sherlock written in Golang. It is an OSINT tool that looks for usernames around the web an…☆25Feb 26, 2025Updated last year
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆63Jul 3, 2021Updated 4 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- Useful Pentest tool links☆12Aug 13, 2020Updated 5 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Jul 2, 2018Updated 7 years ago
- Offensive web scanner: crawling, XSS, SQLi, headers and WAF bypass☆13Apr 20, 2026Updated last week
- Streaming media player (internet radio) based on ESP8266 and VS1053☆13Dec 30, 2018Updated 7 years ago
- 🔒 A Node.js ransomware implementation.☆10Jun 17, 2021Updated 4 years ago
- Angular UI component that represents an international payment card☆10Jan 7, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Secure Anti-Forensics and Total Annihilation of iNformation. Advanced counter-forensics tool to make storage data unrecoverable. Multi-pa…☆10Mar 13, 2025Updated last year
- Prototypes from the GOV.UK Forms team in the Government Digital Service.☆12Updated this week
- A shot code to Bypass UAC in Windows.☆26Apr 13, 2022Updated 4 years ago
- regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper☆12Jun 8, 2024Updated last year
- Various Proxmark3 Mods☆59Sep 24, 2012Updated 13 years ago
- Free speech Reddit clone☆14Oct 19, 2023Updated 2 years ago
- CloudWatch Log Redirector☆15Feb 3, 2026Updated 3 months ago
- Xninjaz is a powerful and versatile multi-vulnerability scanner designed to detect various web application vulnerabilities, including Loc…☆11Oct 16, 2025Updated 6 months ago
- CVE/Research Publications☆25Jul 4, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Brute forcing login pages with SQL Injection queries with cURL☆17Feb 23, 2023Updated 3 years ago
- NAT Pinning exploit tool for penetration testers.☆34Jan 20, 2014Updated 12 years ago
- ☆17Mar 19, 2021Updated 5 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Jul 3, 2013Updated 12 years ago
- 3G UMTS Data Radio Access Network Node☆15Apr 6, 2018Updated 8 years ago
- Springer Link Download Module for Python☆20Mar 6, 2023Updated 3 years ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 6 months ago
- A zsh plugin for the Rust programming language toolchain.☆10Sep 28, 2024Updated last year
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆14Aug 8, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- X-ddos666 is a Insane DDOS tool with HTTP/HTTPS PROXY REQUIREMENT {OVER 500 IP PROXY}☆13Oct 16, 2025Updated 6 months ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 9 months ago
- Links Panel, collecting all the links on a page☆16Jun 19, 2025Updated 10 months ago
- HTTP Header Spy enables you to inspect request- response headers and cookies right after page load with no extra clicks.☆18Nov 29, 2025Updated 5 months ago
- Sniffs sensitive data from interface or pcap☆14Feb 19, 2018Updated 8 years ago
- CLI tool to validate CVE v5 JSON records.☆13May 14, 2025Updated 11 months ago
- Streaming media player (internet radio) using ESP32 and VS1053☆24Jun 2, 2019Updated 6 years ago