AmynaSec-Research-Labs / TrilokyaLinks
Powering Hardware, Radio, Web, and IoT Security Assessments Trilokya OS is a powerful, security-focused operating system designed for penetration testers, security researchers, and ethical hackers specializing in hardware security, radio frequency (RF) analysis, web application security, and IoT penetration testing.
☆21Updated 9 months ago
Alternatives and similar repositories for Trilokya
Users that are interested in Trilokya are comparing it to the libraries listed below
Sorting:
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆49Updated last month
- Pentest/Red Team: Resources, repos and scripts.☆78Updated last month
- ☆23Updated 6 months ago
- Chrome extension tool for OSINT & Recon☆57Updated last year
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆36Updated last year
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆25Updated last year
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆56Updated last year
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Updated 4 years ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- AI Powered Terminal Based Ethical Hacking Assistant☆81Updated 11 months ago
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆81Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated last year
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆47Updated last year
- Some Dorking resources☆38Updated last year
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆108Updated last year
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆164Updated 8 months ago
- Google Dorking Payloads☆11Updated last year
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 5 years ago
- Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links on…☆55Updated 3 years ago
- Many script that can be modified according to your needs for Information Gathering and Asset discovery in Bug Bounty Hunting (Pull reques…☆60Updated last year
- KaliPAKU is a training tool for penetration testing using Kali Linux. It is designed to help security professionals and engineers improve…☆37Updated 2 years ago
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆33Updated 2 months ago
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆44Updated last year
- Internal Network Penetration Test Playbook☆20Updated 4 years ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆27Updated 8 months ago
- ☆23Updated 8 months ago