D4Vinci / EagleEyeLinks
A host-based IDS and network monitoring system (My graduation project)
☆20Updated 4 years ago
Alternatives and similar repositories for EagleEye
Users that are interested in EagleEye are comparing it to the libraries listed below
Sorting:
- WebHook for Red Team☆26Updated 4 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 4 months ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- Get trails tool: Get all urls indexed of target☆22Updated 4 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated 2 years ago
- Windows Auto Post Exploitation - For ReD Team☆16Updated 6 years ago
- Spider or repeater to find all links.☆11Updated 4 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15Updated 5 years ago
- NetScan is a Network Reconnaissance Tool for Windows/Linux/OSx etc Written in Python 3.☆23Updated 4 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Updated 11 years ago
- Web App Pen Tester (Web Interface)☆32Updated 2 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- Hax is a mini-tool with really useful hacking tools.☆20Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Updated 2 years ago
- OSINT license plate data by scraping lookup site(s)☆12Updated 2 years ago
- pen testing scripts☆12Updated 4 years ago
- All xxx-arsenal repos in one☆16Updated 6 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Updated 4 years ago
- PhishGen is a penetration testing and red teaming tool that automates the process of generating email addresses using names scraped from …☆42Updated 6 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆15Updated last year
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆16Updated 3 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Updated 3 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆47Updated 3 weeks ago
- DES Encrypter/Decrypter☆19Updated 8 years ago
- Damn Small SQLi Scanner. (DSSS)☆16Updated 7 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Anubis 7.0☆27Updated last year
- A tool to test penetration into personal systems (current version is beta)☆37Updated 3 years ago
- A lightweight ducky script generator written in python.☆30Updated 4 years ago
- A simple python scanner to detect vulnerable hosts in your net☆21Updated 8 years ago