BinRecon / blackeye-v2View external linksLinks
The ultimate phishing tool with 38 websites available!
☆13Nov 7, 2024Updated last year
Alternatives and similar repositories for blackeye-v2
Users that are interested in blackeye-v2 are comparing it to the libraries listed below
Sorting:
- A dump of all the scripts that I make☆19Jul 4, 2021Updated 4 years ago
- ☆12Jul 5, 2023Updated 2 years ago
- ☆12Aug 22, 2017Updated 8 years ago
- A web crawler in PHP☆12Aug 16, 2018Updated 7 years ago
- The files for my Solder Sustainer v2 project! Check it out at www.roboticworx.io!☆14Jan 8, 2025Updated last year
- A framework to kickstart yourself in making malicious USB devices using ATTiny85.☆14Jun 11, 2025Updated 8 months ago
- LDAP Enumeration Tool☆13Mar 28, 2024Updated last year
- ☆14Nov 18, 2021Updated 4 years ago
- A privacy focused, Chromium browser for web scraping. Built with Tor and PySide6 (a QT framework).☆10Mar 13, 2023Updated 2 years ago
- This tool provides an interactive TUI for reviewing Nessus finding exports, running security tools (nmap, netexec, metasploit), and track…☆58Feb 5, 2026Updated last week
- Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The c…☆17Mar 30, 2023Updated 2 years ago
- Useful Alfred Snippets for Pentest☆18Dec 5, 2024Updated last year
- A macro script to automatically grind Dank Memer written in Python. This script is compatible with the 31 July 2021 button update!!☆13Dec 19, 2021Updated 4 years ago
- Performing website vulnerability scanning using OpenAI technologie☆67Apr 5, 2025Updated 10 months ago
- Menu driven wordlist generator in C++☆19Jan 2, 2022Updated 4 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 3 years ago
- Hack a Drone☆19Feb 6, 2018Updated 8 years ago
- A Python script to hack parrot drones automatically. It allows to spawn a shell on the drone to control it.☆15Feb 21, 2019Updated 6 years ago
- Distributed restful text mining.☆21Jan 19, 2016Updated 10 years ago
- LFI to RCE tool.☆15May 10, 2020Updated 5 years ago
- A set of scripts for managing an Ethernet Person-in-the-Middle device, a la Duckwall "A Bridge Too Far"☆17Aug 28, 2021Updated 4 years ago
- A self balancing robot, utilizing a Teensy LC☆20Jul 13, 2022Updated 3 years ago
- A list of professions, apps, and human activities that are ripe for replacement by artificial intelligence. But not really.☆20Dec 3, 2024Updated last year
- Gluetun VPN Randomizer☆28Oct 28, 2024Updated last year
- Mirror of self-tuning portable RF jammer☆23Feb 2, 2018Updated 8 years ago
- WSDL Parser extension for Burp☆20Feb 13, 2017Updated 9 years ago
- Session material and demos for Top 10 Active Directory Management Tasks with PowerShell☆27Aug 30, 2020Updated 5 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- ☆21Jan 30, 2019Updated 7 years ago
- ☆22Jan 26, 2023Updated 3 years ago
- ARCHIVED: Use 'peh' instead☆16May 4, 2021Updated 4 years ago
- Command-line tool to detect email spoofing vulnerabilities by analyzing SPF and DMARC DNS records. Supports single and bulk domain checks…☆24Apr 8, 2025Updated 10 months ago
- Rebuild of portspoof in GO with additional features.☆28Oct 24, 2025Updated 3 months ago
- Adding capabilities to original cyber viking.☆31Apr 9, 2025Updated 10 months ago
- ☆30Jun 25, 2024Updated last year
- Scripts I created to pass the OSCP☆22Jul 23, 2021Updated 4 years ago
- Flexible Orange Box (Type II Caller ID Generator)☆26Nov 28, 2022Updated 3 years ago
- ☆23Jul 5, 2020Updated 5 years ago
- Write-Ups for TryHackMe☆23May 15, 2021Updated 4 years ago