1d8 / sedoppkitLinks
A knockoff social-engineer toolkit
☆49Updated 4 years ago
Alternatives and similar repositories for sedoppkit
Users that are interested in sedoppkit are comparing it to the libraries listed below
Sorting:
- Automated rogue access point setup tool.☆197Updated 4 years ago
- Linux Cheat Sheet☆123Updated 5 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆240Updated last year
- DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets☆238Updated 4 years ago
- A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generati…☆293Updated 3 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 3 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- Based on reading from The Hackers Playbook 3☆29Updated 5 years ago
- Magicleaks it's a python script that checks if an email or a list of email accounts was compromised☆68Updated 3 years ago
- ☆414Updated 2 years ago
- A simple script to generate a hidden url for social engineering.☆123Updated 5 years ago
- A OSINT tool to obtain a target's phone number just by having his email address☆30Updated 5 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆121Updated last year
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆191Updated 2 years ago
- MDPin is a server and a website. It contains an UI to fake a Android login screen to steal their pin code. It works via a web browser, by…☆44Updated 4 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆105Updated last year
- This Script Will Detect Canary Token in Microsoft Word Documents☆54Updated 4 years ago
- Tool for especially scanning nearby devices and execute a given command on its own system while the target device comes in range.☆376Updated 3 years ago
- Web Application Vulnerability Scanner☆127Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- Zero Infrastructure Password Cracking☆408Updated last year
- Perform Google Dork search with Dorkify☆204Updated 2 years ago
- Evildork targeting your fiancee👁️☆87Updated 2 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆373Updated 2 years ago
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Updated 2 years ago
- ☆33Updated 8 years ago
- An easy to handle hacking script, SSH Forcebrute, FTP Forcebrute and many others features☆63Updated 3 years ago
- My documentation and tools for learn ethical hacking.☆142Updated 4 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆83Updated 4 years ago
- Telegram RAT written in Python☆111Updated 2 years ago