84KaliPleXon3 / TentacleView external linksLinks
☆14Jul 27, 2020Updated 5 years ago
Alternatives and similar repositories for Tentacle
Users that are interested in Tentacle are comparing it to the libraries listed below
Sorting:
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- collects potentially vulnerable web pages and applications on the Internet or other awesome info that is picked up by Google's search bot…☆10Apr 24, 2021Updated 4 years ago
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆13Nov 28, 2018Updated 7 years ago
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- Subdomain crawler with wordlist using python☆12Mar 22, 2020Updated 5 years ago
- This includes CVE-2022-22963, a Spring SpEL / Expression Resource Access Vulnerability, as well as CVE-2022-22965, the spring-webmvc/spri…☆14Mar 31, 2022Updated 3 years ago
- 分支出了些问题,无法合并到main,迁移至https://github.com/hktalent/scan4all☆17Dec 18, 2023Updated 2 years ago
- Packet sniffer using scapy☆24Mar 21, 2020Updated 5 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- This Tool is for web penetration Testing.☆21Jan 10, 2021Updated 5 years ago
- The class resources for the v3 deauther☆21Jul 27, 2020Updated 5 years ago
- SRCScan(submon) is a SRC assistant tool that periodically scans subdomains and requests WEB services on port 80/443 to check if it is ava…☆18Feb 26, 2021Updated 4 years ago
- A python network scanner using scapy☆24Mar 21, 2020Updated 5 years ago
- Files and challenges for the OSINT workshop including examples☆22Feb 16, 2020Updated 5 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆23Feb 11, 2025Updated last year
- a personal leaks database to improve combolists and for more effective pentests☆25Sep 4, 2023Updated 2 years ago
- Bash Scripting Examples☆23Jan 21, 2022Updated 4 years ago
- ☆25Mar 31, 2021Updated 4 years ago
- 通达OA<v11.5&v11.6版本RCE Exploit☆26Aug 23, 2020Updated 5 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Sample iOS App to test Jailbreak Detection Bypass☆25Nov 1, 2017Updated 8 years ago
- 基于BurpCollector的二次开发, 记录Burpsuite Site Map记录的里的数据包中的 目录路径参数名信息,并存入Sqlite,并可导出txt文件。☆24May 8, 2019Updated 6 years ago
- 网站快照工具☆26Jun 30, 2021Updated 4 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆27Nov 21, 2022Updated 3 years ago
- 火刃 - 轻量级的,多功能的,联合xray、物联网引擎的全自动广域队列扫描器☆28Mar 7, 2022Updated 3 years ago
- Recon Dog is an all in one tool for all your basic information gathering needs.☆11Mar 2, 2018Updated 7 years ago
- Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It suppo…☆376Mar 6, 2024Updated last year
- ☆10Dec 3, 2021Updated 4 years ago
- Python script for monitoring huawei storages☆10Sep 2, 2020Updated 5 years ago
- ☆14Apr 29, 2021Updated 4 years ago
- Find the zone of the mobile number using the suffix code☆14Aug 17, 2022Updated 3 years ago
- Scrape emails, phone numbers and social media accounts from a website. You can use the found information to gather more information or ju…☆15Dec 6, 2021Updated 4 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- golang写的批量对目标网站进行截图的小工具,适合目标资产比较多时,快速定位薄弱点。☆33Oct 14, 2022Updated 3 years ago
- nmap service and application version detection使用nmap的指纹库进行版本识别☆34Nov 26, 2020Updated 5 years ago
- Small POC for process ghosting☆40Feb 1, 2022Updated 4 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- Show info about the author by facebook photo url☆40Apr 7, 2017Updated 8 years ago