CybernetiX-S3C / T.U.F.F.Links
T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentesting solution. The script is based on Kali Linux tools already pre-installed.
☆11Updated 2 years ago
Alternatives and similar repositories for T.U.F.F.
Users that are interested in T.U.F.F. are comparing it to the libraries listed below
Sorting:
- Information Gathering Tool☆58Updated 2 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆57Updated 7 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆44Updated 6 years ago
- Based on reading from The Hackers Playbook 3☆28Updated 5 years ago
- Information gathering tool - OSINT☆39Updated 6 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆46Updated 3 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 5 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆54Updated 4 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆17Updated 4 years ago
- A Windows Tool for doing OSINT investigations on a Facebook Profile☆75Updated 7 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆47Updated 3 weeks ago
- ITWSV- Integrated Tool for Web Security Vulnerability☆65Updated 5 years ago
- FUD Android Payload and Listener☆21Updated 7 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆86Updated 6 years ago
- Gloom-Framework :: Linux Penetration Testing Framework☆53Updated 8 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆63Updated 5 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- A tool to harvest credentials from leaked data dump☆77Updated 3 years ago
- Facebook phisher to get password and email of victim.☆29Updated 7 years ago
- Priv8 Image Capturing through Network Based On Driftnet☆24Updated 7 years ago
- A Complete Phishing Tool☆35Updated 5 years ago
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆50Updated 4 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆19Updated 3 years ago
- Hacking Tools For All Debian-based OS☆50Updated 7 years ago
- Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools☆59Updated 2 years ago
- Python Security/Hacking Kit☆47Updated 6 years ago
- E-ntel is a tool gathering email accounts informations (ip,hostname,country,...) from different public source (search engines, pgp key se…☆30Updated 6 years ago
- Eficaz herramienta capaz de inyectar un backdoor a casi cualquier app Android actual☆38Updated 5 years ago
- Get files from Android directories☆11Updated 6 years ago