CybernetiX-S3C / T.U.F.F.Links
T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentesting solution. The script is based on Kali Linux tools already pre-installed.
☆11Updated 2 years ago
Alternatives and similar repositories for T.U.F.F.
Users that are interested in T.U.F.F. are comparing it to the libraries listed below
Sorting:
- Information gathering tool - OSINT☆38Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆56Updated 7 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆45Updated 6 years ago
- A Windows Tool for doing OSINT investigations on a Facebook Profile☆72Updated 7 years ago
- Information Gathering Tool☆58Updated 2 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- ITWSV- Integrated Tool for Web Security Vulnerability☆65Updated 5 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆48Updated 2 years ago
- Gloom-Framework :: Linux Penetration Testing Framework☆51Updated 7 years ago
- This repo contains tools that hackers use for penetration testing and web hacking, DNS spoofing, MiTM, malware and more. It's made easy j…☆20Updated 3 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Updated 6 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆24Updated 4 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆19Updated 3 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆82Updated 5 years ago
- Get files from Android directories☆11Updated 6 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- Hacking Tools For All Debian-based OS☆52Updated 7 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆63Updated 5 years ago
- ☆17Updated 7 years ago
- Based on reading from The Hackers Playbook 3☆29Updated 5 years ago
- E-ntel is a tool gathering email accounts informations (ip,hostname,country,...) from different public source (search engines, pgp key se…☆29Updated 6 years ago
- Most advanced framework yet! From spoofing to cryptography, Trity has it all!☆42Updated 8 years ago
- SMS Phishing Tools☆79Updated 8 years ago
- Python script that will extract all saved passwords from your google chrome database on windows only☆77Updated 4 years ago
- SMS Spoofer for Social Engineering/Pentest Engagements☆45Updated 8 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 4 years ago
- A tool to harvest credentials from leaked data dump☆74Updated 3 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆18Updated 4 years ago
- Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools☆57Updated 2 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆47Updated 2 years ago