Frninezy / LimboLinks
Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is intended for educational purposes only and should only be used ethically
☆47Updated last year
Alternatives and similar repositories for Limbo
Users that are interested in Limbo are comparing it to the libraries listed below
Sorting:
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆62Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆131Updated last year
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆93Updated 2 months ago
- Pentest/Red Team: Resources, repos and scripts.☆71Updated 2 weeks ago
- An OSINT Framework project based on Python☆106Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 4 years ago
- Crawls URL to get a better image of what is tied to a website.☆33Updated 2 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆98Updated 8 months ago
- IoT Camera Reconnaissance and Live Viewer☆148Updated 11 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆137Updated last year
- 🕵️ Email osint tool☆62Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆70Updated 2 years ago
- ☆110Updated last year
- Here are +200 different rats some with source code☆103Updated last year
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆236Updated 10 months ago
- PassBreaker☆63Updated last year
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆76Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- Dark-Shell is a Tool for Generating ReverShell File☆115Updated last year
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆65Updated last year
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆47Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- Helping you delete your old accounts☆86Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆133Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- Mass bruteforce authentication of common services with common credentials.☆48Updated last year
- POC | Steal user WhatsApp information/data☆68Updated 2 months ago
- Discovering Typo Squatting on your domains!☆71Updated 11 months ago
- ☆122Updated last year