The SteaLinG is an open-source penetration testing framework designed for social engineering
☆244Jul 3, 2024Updated last year
Alternatives and similar repositories for SteaLinG
Users that are interested in SteaLinG are comparing it to the libraries listed below
Sorting:
- Remote persistent 🔑Logger for Windows and Linux☆295Apr 21, 2023Updated 2 years ago
- steal chrome saved passwords "undetectable"☆51Mar 15, 2022Updated 3 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆116Jul 18, 2023Updated 2 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆23Nov 20, 2022Updated 3 years ago
- Hacking with PasteJacking technique☆22Jul 2, 2024Updated last year
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- Pentesting automation platform that combines hacking tools to complete assessments☆520Updated this week
- Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify your web applications against mal…☆302Dec 30, 2025Updated 2 months ago
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 3 years ago
- ☆336May 29, 2023Updated 2 years ago
- Remote persistent keylogger for Windows and Linux..☆12Aug 21, 2022Updated 3 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- Attack Surface Discovery tool built on a microservice approach, utilizing multi-threading for fast, internet-scale asset indexing☆255Dec 12, 2025Updated 2 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆530Feb 5, 2024Updated 2 years ago
- E4GL30S1NT - Simple Information Gathering Tool☆664Jun 8, 2025Updated 8 months ago
- A Web Vulnerability Scanner and Patcher☆170Feb 14, 2026Updated 2 weeks ago
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆110Jul 31, 2023Updated 2 years ago
- A multi web security purposes tool☆47Feb 23, 2026Updated last week
- A tool designed to analyse email headers☆40Oct 4, 2022Updated 3 years ago
- ☆12Oct 31, 2022Updated 3 years ago
- Windows offline filesystem hacking tool for Linux☆96Jun 24, 2022Updated 3 years ago
- A tool that removes traces of executed applications on Windows OS.☆122Sep 4, 2022Updated 3 years ago
- A penetration testing and vulnerability management application written using the powerful django framework.☆30Nov 22, 2023Updated 2 years ago
- ☆72Apr 24, 2023Updated 2 years ago
- Bash script for CTF automating basic enumeration☆41Mar 1, 2022Updated 4 years ago
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- ☆132Jan 25, 2023Updated 3 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- PowerShell Asynchronous TCP Reverse Shell☆158Nov 27, 2025Updated 3 months ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆123Mar 18, 2023Updated 2 years ago
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- Find Email Spoofing Vulnerablity of domains☆96Jul 30, 2024Updated last year
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆67Mar 4, 2023Updated 2 years ago
- An XSS exploitation command-line interface and payload generator.☆1,414Jan 19, 2025Updated last year
- ⛤Keylogger Generator for Windows written in Python⛤☆55Jun 9, 2023Updated 2 years ago
- Malicious powershell scripts loader designed to avoid detection.☆61Jun 16, 2023Updated 2 years ago