Chat with anyone around the world using your own server and client
☆31May 16, 2024Updated last year
Alternatives and similar repositories for TR-Chat
Users that are interested in TR-Chat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Designed to demonstrate how hackers can obtain detailed information about target devices through a simple link, Get-INFO serves as both a…☆32Aug 3, 2025Updated 7 months ago
- Getting Target Browser information by using a URL☆35Dec 13, 2024Updated last year
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- This tool is design for FTP brute force☆13Jan 23, 2024Updated 2 years ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Mar 31, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- Sent multiple emails at a time.☆20Oct 14, 2022Updated 3 years ago
- ☆18Mar 22, 2021Updated 5 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Jun 21, 2021Updated 4 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆18Mar 25, 2023Updated 2 years ago
- 👽 gpt-4 / gpt-3.5-turbo Python integration via OpenAI☆14Dec 7, 2023Updated 2 years ago
- Spoof the email and spams a persons inbox!☆13Jun 24, 2022Updated 3 years ago
- Web Parameter Crawling Tool☆37Feb 21, 2026Updated last month
- CABTA (Blue Team Assistant) - AI-Powered SOC Platform for Threat Analysis, IOC Investigation & Email Forensics☆51Updated this week
- CVE-2023-6875 PoC☆25Jan 15, 2024Updated 2 years ago
- ☆20Jun 16, 2023Updated 2 years ago
- A tool that collects information from IP address☆30May 30, 2021Updated 4 years ago
- Ethical Hacking Roadmap 🌐🔒☆11Dec 19, 2023Updated 2 years ago
- A comprehensive malware detection and dynamic analysis system, designed to analyse malware samples and benign files & classify them using…☆14Sep 18, 2023Updated 2 years ago
- ☆10Jun 30, 2025Updated 8 months ago
- frontend☆19Jun 21, 2020Updated 5 years ago
- Google dorks for SQL injection, Local File Inclusion, open CCTV cams and sensitive information.☆14Jul 6, 2018Updated 7 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆18May 19, 2024Updated last year
- New way to write Markdown☆11Dec 14, 2024Updated last year
- Sencilla Herramienta la cual usa 2 tipos de técnicas para Desconectar a dispositivos conectados a una red por tiempo ilimitado. Herramien…☆62Aug 25, 2023Updated 2 years ago
- A tiny tool to stress test your servers with your android phone.☆10Mar 27, 2014Updated 11 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- OSINT automation for hackers.☆23Jun 27, 2023Updated 2 years ago
- 🍭 Web Application Vulnerability Scanner 🍭☆17May 21, 2022Updated 3 years ago
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management☆18Jan 24, 2024Updated 2 years ago
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- A LaTeX template for writing your thesis. It implements all of the recommendations by DISI at the University of Bologna☆18Oct 26, 2024Updated last year
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- Simple XSS vulnerability checker tool very useful with xsschecker.☆28Nov 21, 2025Updated 4 months ago
- Key features: - Automated AI-driven interviews - Resume analysis and parsing - Real-time video conferencing - Structured evaluation of ca…☆17Aug 2, 2024Updated last year
- 3D printed mini circular table saw.☆11Jul 19, 2014Updated 11 years ago
- Pdf-exploit builder Non-Silent on C#☆20Aug 31, 2024Updated last year
- ☆12Dec 10, 2023Updated 2 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 8 years ago