Python-Based Pentesting Framework
☆30Dec 7, 2022Updated 3 years ago
Alternatives and similar repositories for KITT
Users that are interested in KITT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A python script that finds endpoints in JavaScript files☆10Nov 29, 2019Updated 6 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆24Aug 14, 2023Updated 2 years ago
- HOW TO FIX THE MISSING FIRMWARE OR THE NONFREE FIRMWARE AFTER KALI-LINUX INSTALLATION☆39Sep 25, 2018Updated 7 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Nov 3, 2020Updated 5 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- Python-Based Pentesting CLI Tool☆90Nov 22, 2022Updated 3 years ago
- mac changer and tor re-starter this script restart tor service every 17 sec!☆16Apr 24, 2022Updated 4 years ago
- A general Javascript keylogger to be used in an XSS PoC☆18Feb 23, 2020Updated 6 years ago
- python scripts for penetration testing☆11Oct 17, 2019Updated 6 years ago
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆11Aug 17, 2020Updated 5 years ago
- Receive tokens with no survey☆15Feb 7, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Subdomain Scan With Ping Method.☆46Dec 12, 2020Updated 5 years ago
- Espero que pruebes este mini proyecto... 💭☆20Jun 10, 2021Updated 4 years ago
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Aug 5, 2017Updated 8 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- A multithreaded, very fast and smart HTTP(S) directory and file bruteforcer written in C on top of libcurl☆141May 3, 2026Updated last week
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Apr 5, 2019Updated 7 years ago
- Project files for a mario maker style game☆13Aug 24, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- Shell script to install all my tools in Kali Linux. Includes software tools, Python libraries, and OS updates all in one script.☆18Dec 11, 2019Updated 6 years ago
- Custom Kali Linux☆22Feb 8, 2014Updated 12 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15May 17, 2020Updated 5 years ago
- Google Filestream Forensic Tool☆22Mar 10, 2022Updated 4 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- NOGO is a packaging script that creates fully undetectable payloads specializing in disabling anti-virus. Created for pentesting (crippli…☆11Apr 23, 2019Updated 7 years ago
- IOCTL-Flooder is a verbose tool designed to help with Windows driver fuzzing by brute forcing IOCTLs on loaded drivers. GetLastError is u…☆10Aug 21, 2018Updated 7 years ago
- Hacking Tools☆51Aug 14, 2018Updated 7 years ago
- This is a hacking tool. This can be used to hack any windows machine without being detected.☆12Sep 27, 2021Updated 4 years ago
- Gets the name of all currently running process then checks them against a list of known defensive products such as AV's, EDR's and loggin…☆14Oct 8, 2022Updated 3 years ago
- Golang bindings for macOS / OS X libproc☆15Jan 20, 2018Updated 8 years ago
- Automated PowerShell installer for *Nix with multi Distro support.☆20Nov 21, 2018Updated 7 years ago