WebHook for Red Team
☆26Feb 27, 2021Updated 5 years ago
Alternatives and similar repositories for KHATA
Users that are interested in KHATA are comparing it to the libraries listed below
Sorting:
- Docker image for hacking☆21Feb 10, 2025Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- suricata rules to pcap☆10Mar 25, 2021Updated 4 years ago
- Simple script to bulk check if IPs match networks☆11Jan 11, 2022Updated 4 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆12Nov 17, 2020Updated 5 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Dec 8, 2025Updated 2 months ago
- This repo contains C-programmed sketches for the custom rubber ducky built using ATtiny85 microchip. Blogs on setting up the environment …☆18May 22, 2018Updated 7 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- Monitoring Registry and File Changes in Windows☆69Jan 14, 2026Updated last month
- A framework which writes your Digispark arduino code for a specific metasploit payload.☆21Aug 24, 2021Updated 4 years ago
- Just Mod Version of lokiboard with remote reporting via Gmail☆47Jun 12, 2020Updated 5 years ago
- Detect whether an IP address belongs to a Tor exit node.☆21Jan 6, 2023Updated 3 years ago
- eml metadata parser.☆17Jan 24, 2023Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- And Twitter API library for the ESP32 that can tweet☆22May 8, 2023Updated 2 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- Duitku Payment gateway for PHPNuxBill☆12Aug 23, 2025Updated 6 months ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 5 years ago
- About All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆68Nov 22, 2020Updated 5 years ago
- Send Bulk fake poll votes with your accounts by this tool.☆12Oct 14, 2025Updated 4 months ago
- Simple but sharp ransomware☆35Jul 11, 2020Updated 5 years ago
- Telegram forwarder☆10Jan 20, 2023Updated 3 years ago
- Evaluate and compare SBOMs of Maven projects☆13Mar 3, 2023Updated 3 years ago
- ☆11Jan 14, 2021Updated 5 years ago
- A Python based scanner uses shodan-internetdb to scan the IP.☆31Mar 6, 2022Updated 3 years ago
- This is a bash script used for ISPConfig 3 server migrations☆15Sep 13, 2016Updated 9 years ago
- Script hecho en python, para sacar la IP, de las paginas web.☆11Aug 25, 2022Updated 3 years ago
- An online marketplace that allows users to buy and sell products. Users can register for an account, browse products, add products to the…☆11Feb 18, 2026Updated 2 weeks ago
- Samsung Galaxy A52s 5G (a52sxq) TWRP Device Tree.☆12Jan 27, 2024Updated 2 years ago
- CredFlow is a full-stack Loan Management System built using React, Node.js, and MongoDB. The application provides a complete loan lifecy…☆15Dec 30, 2025Updated 2 months ago
- You can create a virus for a Laptop or phone with this command bell☆10Mar 3, 2021Updated 5 years ago
- A few snippets to show how suricata stats can end up in Influx DB using logstash☆12Jul 11, 2016Updated 9 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- Crossword client for Ubuntu☆10Sep 9, 2018Updated 7 years ago
- Generate image payloads in JS to bypass filters☆39Mar 16, 2021Updated 4 years ago
- Repo for user submitted stencils☆13Jun 9, 2022Updated 3 years ago