WebHook for Red Team
☆26Feb 27, 2021Updated 5 years ago
Alternatives and similar repositories for KHATA
Users that are interested in KHATA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Docker image for hacking☆21Feb 10, 2025Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Detect whether an IP address belongs to a Tor exit node.☆21Jan 6, 2023Updated 3 years ago
- This repo contains C-programmed sketches for the custom rubber ducky built using ATtiny85 microchip. Blogs on setting up the environment …☆18May 22, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- "Whatsapp Discover" is a tool for getting phone numbers of devices using Whatsapp by real time sniffing from an interface (disabled in th…☆22Mar 17, 2014Updated 12 years ago
- And Twitter API library for the ESP32 that can tweet☆22May 8, 2023Updated 2 years ago
- A framework which writes your Digispark arduino code for a specific metasploit payload.☆21Aug 24, 2021Updated 4 years ago
- Pentesting report template for the masses☆16Apr 2, 2020Updated 5 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- Gmail shell, for hackers execute commands via gmail☆19Feb 3, 2021Updated 5 years ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻☆12Nov 8, 2022Updated 3 years ago
- Monitoring Registry and File Changes in Windows☆70Jan 14, 2026Updated 2 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- An IP-Transparent Tor Hidden Service and I2P Connector☆16Jun 5, 2013Updated 12 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆64May 2, 2020Updated 5 years ago
- Bellingcat Hackathon - Digital Investigation Tool 2022☆12Sep 25, 2022Updated 3 years ago
- ☆12Feb 13, 2023Updated 3 years ago
- Template repository and README for submissions to Bellingcat's Global Hackathon☆16Oct 7, 2022Updated 3 years ago
- Coreboot Builder☆16Jun 1, 2017Updated 8 years ago
- Gnuradio blocks and tools for receiving GSM transmissions; mirror of https://gitea.osmocom.org/sdr/gr-gsm☆17Jul 15, 2022Updated 3 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆13Mar 11, 2023Updated 3 years ago
- The following scripts are available in order to be able to reproduce the experiments carried out in...☆11Oct 2, 2024Updated last year
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Hash collisions and exploitations☆20Sep 24, 2024Updated last year
- Topguw implements Gr-gsm tools in Java and makes possible to uses to gsm data☆15Mar 31, 2018Updated 7 years ago
- Just Mod Version of lokiboard with remote reporting via Gmail☆47Jun 12, 2020Updated 5 years ago
- Writeups for various CTFs☆15Apr 26, 2022Updated 3 years ago
- A general-purpose fully customizable software to control a remote computer behind any NAT, Firewall and proxy. Providing secure shell acc…☆39Jul 23, 2022Updated 3 years ago
- F#%! you Doug!☆18Oct 4, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- RubberDucky like payloads for DigiSpark Attiny85☆1,609Oct 28, 2023Updated 2 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated 2 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- a digispark arduino script to pop a reverse hidden shell to a specified ip address using netcat.☆44Feb 3, 2019Updated 7 years ago
- a network filter using NDIS hook technique☆19Mar 28, 2013Updated 12 years ago