Extendable Python script handler for automating penetration testing.
☆40Mar 3, 2023Updated 3 years ago
Alternatives and similar repositories for Ngoto
Users that are interested in Ngoto are comparing it to the libraries listed below
Sorting:
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Feb 27, 2026Updated last week
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- Scraping LegiFrance naturalisation decrees for fun and OSINT profit☆12May 27, 2023Updated 2 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- want to remove sensitive data from photos or even view it? use autoexif to easily help you do that no more remembering syntaxs with this …☆39Apr 23, 2025Updated 10 months ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last week
- List of OSINT resources☆16Dec 17, 2020Updated 5 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- ☆28Sep 10, 2022Updated 3 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Updated this week
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 2 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.☆17Jul 26, 2024Updated last year
- Another vulnerability scanner☆18Aug 9, 2025Updated 7 months ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Mar 2, 2026Updated last week
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- ELF Sectional docking payload injector system☆21Jun 28, 2022Updated 3 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- Tsunami-Fi is simple multi-tool bash application for Wi-Fi attacks☆66Jun 18, 2022Updated 3 years ago
- An OSINT focused tool made with Nodejs!☆100Oct 4, 2022Updated 3 years ago
- Elenco di Distro LINUX - WINDOWS - MacOS☆77May 21, 2024Updated last year
- A set of social media OSINT tools that I use when participating in Trace Labs Search Party CTF☆77Jan 1, 2024Updated 2 years ago
- Scan a host for open HTTP ports and gain information about the services present.☆12Jul 20, 2022Updated 3 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆82Mar 25, 2024Updated last year
- Ransomware groups posts☆44Updated this week
- Command and Control Framework☆13Mar 23, 2024Updated last year
- ☆12Apr 3, 2023Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Apr 8, 2025Updated 11 months ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆55Apr 28, 2022Updated 3 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆49Jul 18, 2024Updated last year