Frninezy / LimboLinks
Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is intended for educational purposes only and should only be used ethically
☆49Updated last year
Alternatives and similar repositories for Limbo
Users that are interested in Limbo are comparing it to the libraries listed below
Sorting:
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆61Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆72Updated 3 weeks ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆79Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated 11 months ago
- An OSINT Framework project based on Python☆107Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆92Updated 4 months ago
- Automated exploit scanner for cameras on the internet☆204Updated last year
- 🕵️ Email osint tool☆62Updated 2 years ago
- IoT Camera Reconnaissance and Live Viewer☆163Updated last year
- Crawls URL to get a better image of what is tied to a website.☆33Updated 2 years ago
- ☆127Updated last year
- What is Phone Track? So phonetrack is a type of OSINT that is used to track someone's location just based on their telephone number☆78Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆64Updated 4 years ago
- Capture screenshots of onion services on an onion service.☆71Updated last year
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆237Updated last year
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆39Updated 5 months ago
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆79Updated last year
- NetProbe: Network Probe☆164Updated last year
- Redirect All Traffic Through Tor Network For Kali Linux☆200Updated 6 months ago
- Helping you delete your old accounts☆86Updated 2 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆135Updated last year
- Mass bruteforce authentication of common services with common credentials.☆49Updated last year
- ☆148Updated 4 months ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆76Updated 7 months ago
- Garudaastra Tool is based on python3 to find cameras around the world☆27Updated 2 years ago
- PassBreaker☆63Updated last year