AmynaSec-Research-Labs / Trilokya
Powering Hardware, Radio, Web, and IoT Security Assessments Trilokya OS is a powerful, security-focused operating system designed for penetration testers, security researchers, and ethical hackers specializing in hardware security, radio frequency (RF) analysis, web application security, and IoT penetration testing.
☆16Updated 2 weeks ago
Alternatives and similar repositories for Trilokya:
Users that are interested in Trilokya are comparing it to the libraries listed below
- Android BugBazaar: Your mobile appsec playground to Explore, Exploit, Excel☆49Updated 7 months ago
- Pentest/Red Team: Resources, repos and scripts.☆68Updated 3 weeks ago
- Challenge Python☆19Updated last year
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Updated 3 months ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated last year
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆31Updated 9 months ago
- ☆37Updated 3 months ago
- Garudaastra Tool is based on python3 to find cameras around the world☆28Updated last year
- A collection of config files for linux focusing on hackthebox theme☆43Updated 3 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Collection of Facebook Bug Bounty Writeups☆29Updated last year
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆51Updated 3 months ago
- A Burp Suite extension that helps track and manage multiple sessions simultaneously by color-coding HTTP requests based on custom pattern…☆25Updated 4 months ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆31Updated last week
- ☆26Updated 2 years ago
- ☆27Updated 9 months ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated 6 months ago
- ☆37Updated 8 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 6 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆58Updated 4 months ago
- This repository contains information on the CVEs I found.☆42Updated last year
- 🕵️ Email osint tool☆62Updated last year
- ☆96Updated 3 years ago
- A collection of tools that I use in CTF's or for assessments☆95Updated last month
- Here are some cool and some unpublished Dorks☆70Updated 2 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆45Updated this week
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆38Updated 3 weeks ago
- Red Teaming tools and techniques☆50Updated 2 years ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆17Updated 8 months ago
- ☆45Updated 3 weeks ago