Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive tool ensures the utmost protection against cyber threats, making it an indispensable asset in the field of cybersecurity.
☆17Aug 20, 2023Updated 2 years ago
Alternatives and similar repositories for Brahmastra
Users that are interested in Brahmastra are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python RAT with reverse connection and asymmetric encrypted communications☆14Jun 30, 2020Updated 5 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- Information gathering tool.☆10Apr 24, 2021Updated 5 years ago
- A tool to automatically redirect all traffic through the TOR and change the IP every 0 to x seconds. And provides a custom MAC address. <…☆103Jan 13, 2026Updated 3 months ago
- collects potentially vulnerable web pages and applications on the Internet or other awesome info that is picked up by Google's search bot…☆10Apr 24, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- All in one tool for lazy hackers.☆10Apr 24, 2021Updated 5 years ago
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 10 months ago
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆71Jul 25, 2023Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- My fuzz repo!☆22Jul 28, 2023Updated 2 years ago
- Infect Any Android Device With Virus From Link In Termux☆11Oct 1, 2023Updated 2 years ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- Chat with anyone around the world using your own server and client☆30May 16, 2024Updated last year
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Dec 23, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Change termux terminal.☆11Nov 17, 2020Updated 5 years ago
- Bash script to show how viruses spread and to demonstrate how ransomware works.☆19Feb 14, 2023Updated 3 years ago
- Simple but sharp ransomware☆38Jul 11, 2020Updated 5 years ago
- Miscellaneous tools for BloodHound☆19Jan 26, 2022Updated 4 years ago
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management☆18Jan 24, 2024Updated 2 years ago
- A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32☆13Nov 16, 2023Updated 2 years ago
- ☆16May 6, 2015Updated 11 years ago
- ☆12Jun 10, 2022Updated 3 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Aug 13, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Simple recon tool automates your recon process☆16Apr 15, 2023Updated 3 years ago
- 🚀 The easiest way to automate building and releasing your iOS and Android apps☆12Updated this week
- Burp or Burp Suite is a set of tools used for penetration testing of web applications. It is developed by the company named Portswigger.☆24Dec 18, 2024Updated last year
- Android-Image-Modifier is script/tool to make unpacking repacking of system files easier and less tedious. So android modders/tweakers ca…☆13May 26, 2020Updated 5 years ago
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆16Nov 27, 2025Updated 5 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The …☆44Mar 3, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Google dorks for SQL injection, Local File Inclusion, open CCTV cams and sensitive information.☆11Jul 6, 2018Updated 7 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆17May 19, 2024Updated last year
- SMR-Portal: an online platform for integrative analysis of GWAS and xQTL data to identify complex trait genes.☆22Dec 2, 2025Updated 5 months ago
- This ia an Offensive Bruteforce Attack Tool, Just For Educational Purpose Only☆47Jan 14, 2026Updated 3 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆31Jun 2, 2024Updated last year
- My Reverse Shell Cheat Sheet☆13Mar 2, 2022Updated 4 years ago
- ☆13Jun 22, 2023Updated 2 years ago