DedSecInside / ViPERLinks
Web App Pen Tester (Web Interface)
☆31Updated 2 years ago
Alternatives and similar repositories for ViPER
Users that are interested in ViPER are comparing it to the libraries listed below
Sorting:
- Windows Crypter/Decrypter Generator with AES 256 bits key☆29Updated 6 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- WebHook for Red Team☆26Updated 4 years ago
- Repository of tools used in my blog☆51Updated last year
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Command Line Interface of ViPER Pen Testing tool.☆14Updated 8 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 10 months ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆16Updated 4 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆27Updated 4 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated last year
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆54Updated 4 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- web information gathering / Grab links☆43Updated 5 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- ☆13Updated 7 years ago
- Jok3r - Network and Web Pentest Framework☆17Updated 6 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆27Updated 5 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- gui tool to create normal payload by msfvenom☆33Updated 6 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Updated 7 years ago
- Automated Google dorking with custom search engines☆27Updated 5 years ago
- Simple Linux RootKit written in python☆10Updated 7 years ago