AmynaSec-Research-Labs / TrilokyaLinks
Powering Hardware, Radio, Web, and IoT Security Assessments Trilokya OS is a powerful, security-focused operating system designed for penetration testers, security researchers, and ethical hackers specializing in hardware security, radio frequency (RF) analysis, web application security, and IoT penetration testing.
☆21Updated 6 months ago
Alternatives and similar repositories for Trilokya
Users that are interested in Trilokya are comparing it to the libraries listed below
Sorting:
- ☆21Updated 2 months ago
- Pentest/Red Team: Resources, repos and scripts.☆72Updated last month
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆43Updated last week
- ☆42Updated 2 months ago
- ☆21Updated 4 months ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆49Updated 10 months ago
- OSINT automation for hackers.☆16Updated 2 years ago
- Many script that can be modified according to your needs for Information Gathering and Asset discovery in Bug Bounty Hunting (Pull reques…☆58Updated last year
- Chrome extension tool for OSINT & Recon☆55Updated last year
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Updated last month
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've …☆55Updated 2 months ago
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- PassBreaker☆64Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 9 months ago
- Internal Network Penetration Test Playbook☆21Updated 4 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆57Updated 2 years ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆53Updated 2 months ago
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆25Updated last year
- Google Dorking Payloads☆11Updated last year
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆34Updated last year
- Android Penetration Testing setup tool. Garuda automates the installation of the required tools to perform Android Security Analysis.☆71Updated 2 years ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆15Updated 6 months ago
- A python tool to test for web cache poisoning denial of service (CPDoS) vulnerabilities.☆14Updated last year
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆30Updated 4 months ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆10Updated last week
- ☆35Updated 5 months ago
- ☆27Updated last year
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Updated 4 years ago