Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive tool ensures the utmost protection against cyber threats, making it an indispensable asset in the field of cybersecurity.
☆18Aug 20, 2023Updated 2 years ago
Alternatives and similar repositories for Brahmastra
Users that are interested in Brahmastra are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python RAT with reverse connection and asymmetric encrypted communications☆16Jun 30, 2020Updated 5 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- Information gathering tool.☆10Apr 24, 2021Updated 4 years ago
- A tool to automatically redirect all traffic through the TOR and change the IP every 0 to x seconds. And provides a custom MAC address. <…☆103Jan 13, 2026Updated 2 months ago
- collects potentially vulnerable web pages and applications on the Internet or other awesome info that is picked up by Google's search bot…☆10Apr 24, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- All in one tool for lazy hackers.☆10Apr 24, 2021Updated 4 years ago
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 9 months ago
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆69Jul 25, 2023Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- My fuzz repo!☆22Jul 28, 2023Updated 2 years ago
- Infect Any Android Device With Virus From Link In Termux☆11Oct 1, 2023Updated 2 years ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- Chat with anyone around the world using your own server and client☆31May 16, 2024Updated last year
- Simple but sharp ransomware☆35Jul 11, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Dec 23, 2021Updated 4 years ago
- Bash script to show how viruses spread and to demonstrate how ransomware works.☆19Feb 14, 2023Updated 3 years ago
- Miscellaneous tools for BloodHound☆19Jan 26, 2022Updated 4 years ago
- A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32☆13Nov 16, 2023Updated 2 years ago
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management☆18Jan 24, 2024Updated 2 years ago
- ☆13Jun 10, 2022Updated 3 years ago
- ☆16May 6, 2015Updated 10 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Aug 13, 2022Updated 3 years ago
- Simple recon tool automates your recon process☆16Apr 15, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- 🚀 The easiest way to automate building and releasing your iOS and Android apps☆11Updated this week
- Android-Image-Modifier is script/tool to make unpacking repacking of system files easier and less tedious. So android modders/tweakers ca…☆13May 26, 2020Updated 5 years ago
- Burp or Burp Suite is a set of tools used for penetration testing of web applications. It is developed by the company named Portswigger.☆24Dec 18, 2024Updated last year
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆16Nov 27, 2025Updated 4 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The …☆45Mar 3, 2022Updated 4 years ago
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- Google dorks for SQL injection, Local File Inclusion, open CCTV cams and sensitive information.☆14Jul 6, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆18May 19, 2024Updated last year
- This ia an Offensive Bruteforce Attack Tool, Just For Educational Purpose Only☆45Jan 14, 2026Updated 2 months ago
- SMR-Portal: an online platform for integrative analysis of GWAS and xQTL data to identify complex trait genes.☆21Dec 2, 2025Updated 3 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Jun 2, 2024Updated last year
- My Reverse Shell Cheat Sheet☆13Mar 2, 2022Updated 4 years ago
- ☆13Jun 22, 2023Updated 2 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago