De3vil / SteaLinGLinks
The SteaLinG is an open-source penetration testing framework designed for social engineering
☆236Updated last year
Alternatives and similar repositories for SteaLinG
Users that are interested in SteaLinG are comparing it to the libraries listed below
Sorting:
- Remote persistent 🔑Logger for Windows and Linux☆296Updated 2 years ago
- Automated exploit scanner for cameras on the internet☆202Updated last year
- ☆133Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆64Updated 4 years ago
- Google dorking tool☆235Updated last week
- WpCrack is an audit and brute force tool used to remotely test WordPress blogging software☆106Updated 2 years ago
- DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.☆138Updated last year
- ☆159Updated 2 years ago
- An XSS Exploitation Tool☆317Updated 3 months ago
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- [EN] BETA: Layla - recon tool for bug bounty☆77Updated 3 years ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆238Updated last year
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆111Updated 2 years ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆26Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆121Updated 2 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆72Updated 2 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆106Updated 2 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆267Updated 4 years ago
- Android penetration testing tool for Kali linux☆188Updated 7 years ago
- A Zphisher GUI Back-Office Plugin☆229Updated last year
- Redirect All Traffic Through Tor Network For Kali Linux☆202Updated 6 months ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆108Updated 9 months ago
- Huge Collection of Wordpress Exploits and CVES☆124Updated 2 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆232Updated last year
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆188Updated 5 months ago
- Fast Modular Web Interfaces Bruteforcer☆228Updated 3 years ago
- Bypass 403☆165Updated 7 months ago
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆194Updated 2 years ago
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24Updated 3 years ago
- An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to he…☆229Updated 3 years ago