Ashwesker / Blackash-CVE-2025-61884Links
CVE-2025-61884
☆24Updated 3 weeks ago
Alternatives and similar repositories for Blackash-CVE-2025-61884
Users that are interested in Blackash-CVE-2025-61884 are comparing it to the libraries listed below
Sorting:
- Source of swisskyrepo.github.io - Public☆26Updated 4 months ago
- Offensive Security Python. Collection of python scripts that I created/pirated/curated to help me understand CyberSecurity. I find it hel…☆52Updated 4 months ago
- ☆11Updated 2 years ago
- HackersPlayground—a curated collection of cybersecurity resources, tools, and methodologies for penetration testers.☆24Updated 8 months ago
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆40Updated 7 months ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your car…☆33Updated last month
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆17Updated 3 years ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆95Updated last month
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Magicspoofing it's a python script that checks & test SPF/DMARC DNS records an tries to spoof a domain with a open relay mail system.☆54Updated 8 months ago
- PersonaAI is a versatile tool designed to perform psychological profiling based on a person's Facebook ID.☆13Updated last year
- OSINT web scraper for SatNow to extract details about satellite components and subsystem specs for in-depth reconnaissance 🛸☆64Updated last year
- External tool for WebBreacher/WhatsMyName project. Client supports 'request headers' and POST requests. The script was prepared not only …☆13Updated last year
- A repository with informtion related to Cloud Osint☆108Updated 7 months ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆105Updated last year
- Python3 script to dump breach data from Dehashed☆38Updated 5 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆48Updated last year
- A spy pixel which can be emedded into web pages or emails.☆105Updated last year
- Collection of extra pentest tools for Kali Linux☆111Updated 2 months ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆78Updated 3 years ago
- A OSINT tool to obtain a target's phone number just by having his email address☆32Updated 6 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆136Updated last year
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆29Updated 6 months ago
- 🕵️ Email osint tool☆63Updated 2 years ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Updated 2 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆48Updated 2 years ago
- Notes for red teamers - from cloud to Active Directory to many things in between.☆59Updated last year
- Hit valid URL☆23Updated 3 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆61Updated last year