Frninezy / LimboLinks
Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is intended for educational purposes only and should only be used ethically
☆48Updated last year
Alternatives and similar repositories for Limbo
Users that are interested in Limbo are comparing it to the libraries listed below
Sorting:
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆62Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆71Updated this week
- An OSINT Framework project based on Python☆106Updated last year
- Crawls URL to get a better image of what is tied to a website.☆33Updated 2 years ago
- ☆111Updated last year
- IoT Camera Reconnaissance and Live Viewer☆152Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆98Updated 9 months ago
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆93Updated 2 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆138Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- Helping you delete your old accounts☆86Updated last year
- PassBreaker☆63Updated last year
- Here are +200 different rats some with source code☆106Updated last year
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆52Updated 5 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆48Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆63Updated 4 years ago
- 🕵️ Email osint tool☆62Updated last year
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆237Updated 11 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated last year
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆77Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆70Updated 2 years ago
- Dark-Shell is a Tool for Generating ReverShell File☆114Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- Web Path Finder☆61Updated last year
- Mass bruteforce authentication of common services with common credentials.☆48Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- Red Team Guides☆139Updated last year
- Capture screenshots of onion services on an onion service.☆70Updated last year