Frninezy / LimboLinks
Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is intended for educational purposes only and should only be used ethically
☆49Updated last year
Alternatives and similar repositories for Limbo
Users that are interested in Limbo are comparing it to the libraries listed below
Sorting:
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆62Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆136Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Updated 2 years ago
- Pentest/Red Team: Resources, repos and scripts.☆78Updated last month
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆64Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated last year
- Hacking with PasteJacking technique☆22Updated last year
- What is Phone Track? So phonetrack is a type of OSINT that is used to track someone's location just based on their telephone number☆83Updated 2 years ago
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆92Updated 6 months ago
- 🕵️ Email osint tool☆63Updated 2 years ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆81Updated last year
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆104Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆69Updated 4 years ago
- IoT Camera Reconnaissance and Live Viewer☆168Updated last year
- An OSINT Framework project based on Python☆108Updated last year
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆43Updated 7 months ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Updated 2 years ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆140Updated 2 years ago
- NetProbe: Network Probe☆169Updated last year
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Updated 4 years ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆43Updated 2 months ago
- Crawls URL to get a better image of what is tied to a website.☆33Updated 2 years ago
- Social Engineering Browser Update Attack.☆58Updated 2 years ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
- Automated exploit scanner for cameras on the internet☆210Updated last year
- PassBreaker☆65Updated last year
- Here are +200 different rats some with source code☆128Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago