CybernetiX-S3C / T.U.F.F.Links
T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentesting solution. The script is based on Kali Linux tools already pre-installed.
☆11Updated 2 years ago
Alternatives and similar repositories for T.U.F.F.
Users that are interested in T.U.F.F. are comparing it to the libraries listed below
Sorting:
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆46Updated 6 years ago
- Information Gathering Tool☆61Updated 2 years ago
- Gloom-Framework :: Linux Penetration Testing Framework☆52Updated 8 years ago
- Fast exploitation based on metasploit.☆74Updated 6 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆46Updated 3 months ago
- Information gathering tool - OSINT☆38Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆59Updated 8 years ago
- A Windows Tool for doing OSINT investigations on a Facebook Profile☆77Updated 7 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 5 years ago
- Get files from Android directories☆11Updated 7 years ago
- Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools☆59Updated 3 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆16Updated 5 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆20Updated 3 years ago
- Based on reading from The Hackers Playbook 3☆29Updated 5 years ago
- A tool to harvest credentials from leaked data dump☆83Updated 4 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆64Updated 5 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆39Updated 7 years ago
- A Simple Keylogger with the ability of FTP Transfer and Local Storage☆21Updated last year
- ITWSV- Integrated Tool for Web Security Vulnerability☆65Updated 6 years ago
- SMS Phishing Tools☆79Updated 8 years ago
- Priv8 Image Capturing through Network Based On Driftnet☆24Updated 7 years ago
- This repo contains tools that hackers use for penetration testing and web hacking, DNS spoofing, MiTM, malware and more. It's made easy j…☆19Updated 4 years ago
- Eficaz herramienta capaz de inyectar un backdoor a casi cualquier app Android actual☆40Updated 5 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆54Updated 4 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆90Updated 6 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆48Updated 3 years ago
- Hacking Tools For All Debian-based OS☆50Updated 7 years ago
- hashcrack is a python script which uses online hash crackers to find cleartext of a hash in less than 3 seconds☆48Updated 7 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆25Updated 7 years ago
- Facebook phisher to get password and email of victim.☆28Updated 7 years ago