AmynaSec-Research-Labs / TrilokyaLinks
Powering Hardware, Radio, Web, and IoT Security Assessments Trilokya OS is a powerful, security-focused operating system designed for penetration testers, security researchers, and ethical hackers specializing in hardware security, radio frequency (RF) analysis, web application security, and IoT penetration testing.
☆20Updated 2 months ago
Alternatives and similar repositories for Trilokya
Users that are interested in Trilokya are comparing it to the libraries listed below
Sorting:
- Pentest/Red Team: Resources, repos and scripts.☆69Updated this week
- ☆21Updated last month
- Chrome extension tool for OSINT & Recon☆53Updated last year
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆22Updated this week
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Updated 4 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆38Updated last week
- ☆18Updated 11 months ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆45Updated 6 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆62Updated last year
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆39Updated 3 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 6 months ago
- Challenge Python☆19Updated 2 years ago
- FireHawk: The Elite Firebase Security Testing Utility☆21Updated last year
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆53Updated 2 years ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆21Updated last month
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆56Updated last year
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆34Updated last year
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Updated 5 months ago
- ☆39Updated 10 months ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆26Updated 5 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- ☆31Updated 2 months ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆44Updated 9 months ago
- ☆27Updated 11 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆53Updated 5 months ago
- Discovering Typo Squatting on your domains!☆70Updated 10 months ago
- Internal Network Penetration Test Playbook☆20Updated 3 years ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year