Penetration testing automation toolkit
☆22Jul 4, 2015Updated 10 years ago
Alternatives and similar repositories for heybe
Users that are interested in heybe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This script installs, updates and runs LOIC on Linux.☆26Oct 6, 2011Updated 14 years ago
- ☆14Oct 5, 2013Updated 12 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- toolkit repository: command line cheatsheet, operation script and so on.☆14Jul 9, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Concurrently test bing results for shellshock vulnerability☆42Sep 27, 2014Updated 11 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆195Jun 23, 2019Updated 6 years ago
- Guides and support for communicating in private.☆19Feb 12, 2019Updated 7 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆35Dec 22, 2013Updated 12 years ago
- Unix/Linux System Programming☆17Jan 1, 2015Updated 11 years ago
- PocketCHIP home screen: shows status, opens programs, changes settings☆14Jun 1, 2016Updated 9 years ago
- TurnKey Linux Configuration Console☆40Oct 2, 2025Updated 5 months ago
- ☆16Mar 20, 2015Updated 11 years ago
- there are some guidelines for us to do penetration on Android application☆23Nov 11, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- ☯️ Egg Magic Validator (Egg 魔法验证工具)☆31Jan 12, 2022Updated 4 years ago
- Updates the Emerging Threats open ruleset for Suricata☆10Sep 20, 2015Updated 10 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆17Aug 9, 2024Updated last year
- Pentesting tool to automate common op tasks and organize discovered data.☆14Mar 13, 2026Updated 2 weeks ago
- Puppet module for non-OSP VMware Tools Installation☆26Jan 27, 2020Updated 6 years ago
- Visualize Terraform plans without the Cloud. A lightweight web UI for S3-backed projects to turn CLI output into clear, readable diffs.☆13Apr 17, 2025Updated 11 months ago
- Burp suite HTTP history advanced search☆10Mar 20, 2018Updated 8 years ago
- DeTT&CT Editor☆12Jan 21, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 11 months ago
- GUI program to generate windows and SQL audit files for nessus☆14Jun 23, 2017Updated 8 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- Example Express application for collecting data from the Stethoscope app☆14May 30, 2018Updated 7 years ago
- A collection of enhancements for Portswigger's popular Burp Suite web penetration testing tool.☆152Feb 21, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Squid with SSL/TLS Proxying☆14Sep 8, 2025Updated 6 months ago
- Lightweight Ransomware @Choudai☆14May 28, 2018Updated 7 years ago
- Red Team Server (RTS)☆16Mar 8, 2024Updated 2 years ago
- ☆63Oct 29, 2012Updated 13 years ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆45Mar 23, 2026Updated last week
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆81Dec 17, 2015Updated 10 years ago
- Configurable, Community driven, HTTP C2 Profile☆28Feb 16, 2026Updated last month