BishopFox / deephackLinks
PoC code from DEF CON 25 presentation
☆242Updated 7 years ago
Alternatives and similar repositories for deephack
Users that are interested in deephack are comparing it to the libraries listed below
Sorting:
- A machine learning based social media pen-testing tool☆150Updated 8 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆141Updated 7 years ago
- Extract Sense out of Gibberish stuff☆82Updated 8 years ago
- Metasploit for machine learning.☆565Updated 2 years ago
- A powerful and extensible wireless drop box☆266Updated 6 years ago
- Various Tools and Docker Images☆280Updated last month
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆253Updated 8 years ago
- ☆623Updated 2 years ago
- Official python API for Phish.AI public and private API to detect zero-day phishing websites☆174Updated 7 years ago
- Fresh Onions is an open source TOR spider / hidden service onion crawler☆80Updated 5 years ago
- Web Sight Docker Deployment☆123Updated 7 years ago
- ☆151Updated last year
- A web front-end for password cracking and analytics☆624Updated 3 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆319Updated 2 years ago
- A Github organization reconnaissance tool.☆219Updated 2 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆356Updated 2 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆146Updated 2 years ago
- A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (crypto…☆203Updated 3 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 8 years ago
- Alohomora was written as a POC and presented at both DefCon and Derby Con. The application marries data pulled from the Ohio Voter Regist…☆43Updated 7 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆102Updated 8 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆319Updated 6 years ago
- Stargate☆94Updated 8 years ago
- ☆280Updated 5 years ago
- Open source offensive security platform for red team, by red team.☆385Updated 7 years ago
- A database of common, interesting or useful commands, in one handy referable form☆747Updated last year
- A powerful target reconnaissance framework powered by graph theory.☆420Updated 2 years ago
- Windows Remote Post Breach Tool via Telegram☆133Updated 7 years ago
- ☆181Updated 11 years ago