☆14Jul 27, 2020Updated 5 years ago
Alternatives and similar repositories for Tentacle
Users that are interested in Tentacle are comparing it to the libraries listed below
Sorting:
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆13Nov 28, 2018Updated 7 years ago
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- collects potentially vulnerable web pages and applications on the Internet or other awesome info that is picked up by Google's search bot…☆10Apr 24, 2021Updated 4 years ago
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- This includes CVE-2022-22963, a Spring SpEL / Expression Resource Access Vulnerability, as well as CVE-2022-22965, the spring-webmvc/spri…☆14Mar 31, 2022Updated 3 years ago
- Packet sniffer using scapy☆25Mar 21, 2020Updated 5 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- How to mix C and Go with cgo on Windows☆22Jul 30, 2017Updated 8 years ago
- This Tool is for web penetration Testing.☆21Jan 10, 2021Updated 5 years ago
- SRCScan(submon) is a SRC assistant tool that periodically scans subdomains and requests WEB services on port 80/443 to check if it is ava…☆18Feb 26, 2021Updated 5 years ago
- A python network scanner using scapy☆24Mar 21, 2020Updated 5 years ago
- The class resources for the v3 deauther☆21Jul 27, 2020Updated 5 years ago
- Files and challenges for the OSINT workshop including examples☆22Feb 16, 2020Updated 6 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆23Feb 11, 2025Updated last year
- a personal leaks database to improve combolists and for more effective pentests☆25Sep 4, 2023Updated 2 years ago
- Bash Scripting Examples☆24Jan 21, 2022Updated 4 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- ☆25Mar 31, 2021Updated 4 years ago
- ☆23Nov 23, 2019Updated 6 years ago
- 通达OA<v11.5&v11.6版本RCE Exploit☆26Aug 23, 2020Updated 5 years ago
- 网站快照工具☆26Jun 30, 2021Updated 4 years ago
- 基于BurpCollector的二次开发, 记录Burpsuite Site Map记录的里的数据包中的目录路径参数名信息,并存入Sqlite,并可导出txt文件。☆24May 8, 2019Updated 6 years ago
- Sample iOS App to test Jailbreak Detection Bypass☆25Nov 1, 2017Updated 8 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆28Nov 21, 2022Updated 3 years ago
- Recon Dog is an all in one tool for all your basic information gathering needs.☆11Mar 2, 2018Updated 8 years ago
- Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It suppo…☆374Mar 6, 2024Updated 2 years ago
- Encrypted reverse proxy in Go.☆31Jun 24, 2018Updated 7 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- Python script for monitoring huawei storages☆10Sep 2, 2020Updated 5 years ago
- Scrape emails, phone numbers and social media accounts from a website. You can use the found information to gather more information or ju…☆15Dec 6, 2021Updated 4 years ago
- For accessing info of both public and private instagram accounts☆17Aug 29, 2022Updated 3 years ago
- ☆14Apr 29, 2021Updated 4 years ago
- ☆10Dec 3, 2021Updated 4 years ago
- nmap service and application version detection使用nmap的指纹库进行版本识别☆34Nov 26, 2020Updated 5 years ago
- Small POC for process ghosting☆40Feb 1, 2022Updated 4 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- Show info about the author by facebook photo url☆40Apr 7, 2017Updated 8 years ago
- d_5tr☆10Aug 26, 2021Updated 4 years ago