FLOCK4H / Jammy
Pentesting Suite
☆16Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for Jammy
- Rubber Ducky powered by NeoKey☆20Updated 5 months ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆10Updated last month
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆48Updated 8 months ago
- Mass bruteforce authentication of network protocols☆44Updated 11 months ago
- A simple CLI tool for detecting breached emails and corresponding passwords.☆17Updated 9 months ago
- Legba recipes.☆41Updated 3 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- ☆11Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆20Updated 4 months ago
- Crack passwords with Hashcat using a Discord Bot.☆22Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 8 months ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆15Updated 5 years ago
- Collection of extra pentest tools for Kali Linux☆94Updated last year
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆9Updated 4 years ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆38Updated 2 months ago
- Files for Aerospace Cybersecurity: Satellite Hacking Workshop☆31Updated 8 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆19Updated 9 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 4 months ago
- A tool designed to analyse email headers☆32Updated 2 years ago
- ☆28Updated last year
- ☆26Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆11Updated last year
- Who We Are☆16Updated 2 months ago
- Simple Tool for webhacking☆10Updated last year
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 6 months ago
- Find open databases - Powered by Binaryedge.io☆12Updated 4 years ago
- Modular framework to exploit UPS devices☆61Updated last year
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆17Updated 3 years ago
- Social Engineering Browser Update Attack.☆54Updated last year