Cisc0-gif / KITT
Python-Based Pentesting Framework
☆31Updated 2 years ago
Alternatives and similar repositories for KITT:
Users that are interested in KITT are comparing it to the libraries listed below
- Devploit v 1.1 Information Gathering Tool☆32Updated 7 years ago
- Jok3r - Network and Web Pentest Framework☆17Updated 5 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆51Updated 4 years ago
- 🔥 Pentest Cheat Sheet☆38Updated 3 years ago
- gui tool to create normal payload by msfvenom☆32Updated 6 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆16Updated 4 years ago
- Automate Metasploit scanning and exploitation☆115Updated 6 months ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆38Updated 2 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Updated 3 years ago
- Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.☆33Updated 3 years ago
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆38Updated 6 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 4 years ago
- webpwn3r ======== WebPwn3r - Web Applications Security Scanner. By Ebrahim Hegazy - @Zigoo0 Thanks: @lnxg33k, @dia2diab @Aelhemily, @o…☆26Updated 6 years ago
- Spaghetti - Web Application Security Scanner☆19Updated 7 years ago
- Complete Automated pentest framework for Information Gathering☆39Updated 5 years ago
- Network/WebApplication Information Gathering, Enumeration and Vulnerability Scanning (Under Development)☆17Updated 6 years ago
- pentest toolbox☆28Updated 2 years ago
- Exploits for some of the vulnerabilities I have discovered☆18Updated 4 years ago
- Wi-Fi Exploit Tool☆53Updated 4 years ago
- Godzilla is an automated scanner tool for bug hunters/pentesters that can scan website for vulnerabilities, Do Information gathering in N…☆30Updated 5 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 2 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- ☆19Updated 7 years ago
- Nuubi Tools (Information-ghatering|Scanner|Recon.)☆86Updated 4 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆45Updated last year
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.☆13Updated 4 years ago
- Web Recon & Exploitation Tool.☆55Updated 5 years ago
- DirBruter is a Python based CLI tool. It looks for hidden or existing directories/files using brute force method. It basically works by l…☆18Updated last year
- Ladon for Linux (Kali), Large Network Penetration Scanner, vulnerability / exploit / detection / MS17010 / password☆49Updated 5 years ago