CybernetiX-S3C / T.U.F.F.Links
T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentesting solution. The script is based on Kali Linux tools already pre-installed.
☆11Updated 2 years ago
Alternatives and similar repositories for T.U.F.F.
Users that are interested in T.U.F.F. are comparing it to the libraries listed below
Sorting:
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆58Updated 8 years ago
- Information gathering tool - OSINT☆38Updated 6 years ago
- ITWSV- Integrated Tool for Web Security Vulnerability☆66Updated 6 years ago
- Information Gathering Tool☆58Updated 2 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆45Updated 6 years ago
- Fast exploitation based on metasploit.☆74Updated 6 years ago
- Based on reading from The Hackers Playbook 3☆29Updated 5 years ago
- A Windows Tool for doing OSINT investigations on a Facebook Profile☆77Updated 7 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆89Updated 6 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆46Updated 2 months ago
- Information Gathering & WebSite ReConnaissance.☆24Updated 7 years ago
- Gloom-Framework :: Linux Penetration Testing Framework☆52Updated 8 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆54Updated 4 years ago
- Priv8 Image Capturing through Network Based On Driftnet☆24Updated 7 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆47Updated 3 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆19Updated 3 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆64Updated 5 years ago
- Hacking Tools For All Debian-based OS☆50Updated 7 years ago
- Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools☆59Updated 3 years ago
- This repo contains tools that hackers use for penetration testing and web hacking, DNS spoofing, MiTM, malware and more. It's made easy j…☆19Updated 4 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆87Updated last year
- A tool to harvest credentials from leaked data dump☆82Updated 4 years ago
- A Complete Phishing Tool☆34Updated 5 years ago
- SMS Phishing Tools☆79Updated 8 years ago
- Get files from Android directories☆11Updated 7 years ago
- Ransombile is a tool that can be used in different scenarios to compromise someone’s digital life when having physical access to a locked…☆83Updated 3 years ago
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆48Updated 4 years ago
- Hacking Tools☆50Updated 7 years ago
- Facebook phisher to get password and email of victim.☆28Updated 7 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆30Updated 7 years ago