A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.
☆125Mar 18, 2023Updated 3 years ago
Alternatives and similar repositories for dBmonster
Users that are interested in dBmonster are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Network sniffing automation with Bettercap as rogue AP or as client in your network☆25May 30, 2022Updated 3 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- AWS Security Tool☆29Jan 1, 2024Updated 2 years ago
- Command and Control Framework☆13Mar 23, 2024Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆77Nov 19, 2024Updated last year
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆69Mar 4, 2023Updated 3 years ago
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆26Jul 18, 2022Updated 3 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- A fast, powerful open-source password generator with hexagonal architecture. Features a zero-dependency core, Web UI demo, CLI tool, and …☆22Mar 26, 2026Updated 3 weeks ago
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆243Jul 3, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Apr 25, 2022Updated 3 years ago
- Bash script for CTF automating basic enumeration☆41Mar 1, 2022Updated 4 years ago
- A Hacking and Pentesting Tool for Windows☆20Jul 17, 2025Updated 8 months ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Dec 6, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 8 years ago
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework☆169Feb 4, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆132Jan 25, 2023Updated 3 years ago
- GoSniper is a DoS tool/DDoS tool.☆22Aug 21, 2022Updated 3 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Jul 6, 2024Updated last year
- Track planes by ICAO, Type, Operator and Squawk and issue notifications on Mastodon, Discord, and Twitter☆13Jan 10, 2024Updated 2 years ago
- Collecting, processing and presenting information about WiFi access points and their geolocation. A versatile wardriving command center.☆15Mar 16, 2026Updated 3 weeks ago
- ☆26Apr 11, 2024Updated 2 years ago
- Locate device location using Social engineering☆18Sep 30, 2022Updated 3 years ago
- Google dorking tool☆247Jan 1, 2026Updated 3 months ago
- An application to test windows and linux shellcodes☆94Nov 6, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Cosmo PDA Linux kernel v4.4 (for Debian)☆14Nov 15, 2023Updated 2 years ago
- First iteration of ML based Feedback WAF☆59Mar 20, 2024Updated 2 years ago
- Drone Hacking Tool is a GUI tool that works with a USB Wifi adapter and HackRF One for hacking drones.☆672Nov 25, 2022Updated 3 years ago
- Script en bash de Nmap que se puede personalizar para ajustar el escaneo a tus necesidades.☆13Jul 20, 2024Updated last year
- Detects near-by devices such as cell phones, tablets, and laptops. Does this through 802.11, Bluetooth, cell phone protocols, etc..☆19Mar 24, 2014Updated 12 years ago
- ☆37Jun 23, 2022Updated 3 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Updated this week