CybernetiX-S3C / T.U.F.F.Links
T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentesting solution. The script is based on Kali Linux tools already pre-installed.
☆11Updated 2 years ago
Alternatives and similar repositories for T.U.F.F.
Users that are interested in T.U.F.F. are comparing it to the libraries listed below
Sorting:
- Information gathering tool - OSINT☆39Updated 6 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆19Updated 3 years ago
- ITWSV- Integrated Tool for Web Security Vulnerability☆65Updated 5 years ago
- Information Gathering Tool☆58Updated 2 years ago
- A Windows Tool for doing OSINT investigations on a Facebook Profile☆74Updated 7 years ago
- Gloom-Framework :: Linux Penetration Testing Framework☆52Updated 8 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆45Updated 6 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 5 years ago
- Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools☆58Updated 2 years ago
- E-ntel is a tool gathering email accounts informations (ip,hostname,country,...) from different public source (search engines, pgp key se…☆29Updated 6 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆46Updated 2 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆47Updated 2 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆17Updated 4 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 4 years ago
- Keylogger for ethical hackers☆13Updated 4 years ago
- A tool to harvest credentials from leaked data dump☆76Updated 3 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆86Updated 6 years ago
- Based on reading from The Hackers Playbook 3☆28Updated 5 years ago
- SMS Spoofer for Social Engineering/Pentest Engagements☆46Updated 8 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆56Updated 7 years ago
- Hacking Tools For All Debian-based OS☆50Updated 7 years ago
- Hacking Tools☆50Updated 7 years ago
- This repo contains tools that hackers use for penetration testing and web hacking, DNS spoofing, MiTM, malware and more. It's made easy j…☆19Updated 4 years ago
- FUD Android Payload and Listener☆20Updated 7 years ago
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆111Updated 3 years ago
- hashcrack is a python script which uses online hash crackers to find cleartext of a hash in less than 3 seconds☆47Updated 7 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆85Updated 9 months ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆63Updated 5 years ago
- Get files from Android directories☆11Updated 6 years ago