KevCui / obashfuscatorLinks
A Bash script to obfuscate Bash script
☆38Updated 5 years ago
Alternatives and similar repositories for obashfuscator
Users that are interested in obashfuscator are comparing it to the libraries listed below
Sorting:
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 4 years ago
- A GUI Frontend for services provided by https://thc.org/segfault☆78Updated last year
- Docker environment for hackers☆17Updated 5 years ago
- Python program that denies internet access to a target within a local network...☆22Updated 4 years ago
- List of NSO Pegasus's C2C Servers where will be used to control Pegasus.☆19Updated last month
- 🌵 Command and Action routine Server☆17Updated this week
- w1f1t3kAl1☆47Updated last year
- OpenVPN VPN Gate Client for Linux, connects you to a random Free VPN in a country of your choice by country code.☆48Updated 2 months ago
- steal password mozilla firefox ,windows,Linux☆11Updated 5 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Packet sniffer using scapy☆23Updated 5 years ago
- Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor networ…☆89Updated 4 months ago
- This informative guide offers essential tips to avoid legal trouble with law enforcement by educating readers on their rights and ways to…☆26Updated 3 weeks ago
- Tool useful to discover services behind unknown ports☆13Updated 4 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 4 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆11Updated 3 years ago
- ADB Download All Files - A dirty shell script to adb pull all readable files using adb pull & base64☆25Updated 4 years ago
- ☆17Updated 2 years ago
- A script to build either Blackarch, Kali linux or ParrotOS Docker container which has the ability to provide desktop environment access e…☆40Updated 3 years ago
- Auto connect and reconnect to Mikrotik free WiFi point on DD-WRT router☆12Updated 9 years ago
- My blog about Cybersecurity, Privacy and Systems :)☆41Updated 6 months ago
- Collection of Vulnerable Websites containing File Upload Vulnerability for practicing skill☆12Updated 3 years ago
- WebHook for Red Team☆26Updated 4 years ago
- Web scraping | Website cloner | Path Traversal Scanner☆16Updated 2 months ago
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆78Updated 2 years ago
- This is a setup for a Tor based mail hosting server☆25Updated last month
- Docker image for hacking☆20Updated 10 months ago
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 3 years ago
- URL Shortener and IP Logger. Gives information about User agent and IP location.☆24Updated 3 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Updated 6 years ago