A tool for hacking into publicly exposed network cameras, with support for specifying country and region.
☆479Mar 2, 2026Updated this week
Alternatives and similar repositories for BloodCat
Users that are interested in BloodCat are comparing it to the libraries listed below
Sorting:
- Advanced analysis software for APK payloads created by RATs.☆35Feb 24, 2026Updated last week
- ScanKDea es un escáner de seguridad avanzado en Python diseñado para profesionales de ciberseguridad y auditorías éticas. Ofrece capacida…☆23May 30, 2025Updated 9 months ago
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆33Jul 13, 2025Updated 7 months ago
- Config files for my GitHub profile.☆13Jan 16, 2024Updated 2 years ago
- DEDSEC_WI-FIDAR is a Linux-based Wi-Fi mapping tool designed for network analysis. It scans available Wi-Fi networks in your area and cal…☆200Apr 11, 2025Updated 10 months ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆46Aug 16, 2025Updated 6 months ago
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆65Nov 14, 2025Updated 3 months ago
- ☆14Nov 8, 2024Updated last year
- C programs for sockets, reverse shell, shellcode execution, and process injection.☆25Dec 10, 2025Updated 2 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆81Sep 11, 2025Updated 5 months ago
- Nuclei scripts created by @rxerium for zero days / actively exploited vulnerabilities.☆77Feb 5, 2026Updated last month
- CTI Cyber Threat Intelligence OSINT Dark Web Deep Web Research. Ransomware gang information gathering tool.☆137Dec 19, 2025Updated 2 months ago
- Tool Bash para automatizar y penetrar fallas de SQL en sitios webs.☆28Jun 4, 2025Updated 9 months ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Dec 29, 2024Updated last year
- An abstraction around the set of tools to bypass internet censorship in extremely restricted regions.☆14Nov 2, 2025Updated 4 months ago
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆16Jul 10, 2025Updated 7 months ago
- A simple tool to interact with web shells and command injection vulnerabilities☆36Nov 26, 2024Updated last year
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated 2 weeks ago
- Clawdbot/Moltbot/OpenClaw One-click RCE PoC 🦞 (CVE-2026-25253)☆76Jan 27, 2026Updated last month
- SQLMap with Autonomous AI, phased workflows, RAG memory, and MCP Agent Tools☆76Updated this week
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Dec 30, 2024Updated last year
- eyuyan image rebuild tools source code☆13Sep 1, 2016Updated 9 years ago
- BookMark and Find Subdomains, Endpoints, External Domains in your web browser.☆28Aug 1, 2025Updated 7 months ago
- OMLASP (Ideas Locas)☆21Nov 10, 2022Updated 3 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆27Dec 20, 2025Updated 2 months ago
- Just another EDR killer☆125Jan 21, 2026Updated last month
- Herramienta de OSINT para WhatsApp que permite obtener fotos de perfil, verificar cuentas Business, consultar estado e información de usu…☆108Sep 12, 2025Updated 5 months ago
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆38Feb 3, 2025Updated last year
- Creating a Fake WhatsApp Message via SQLite: Understanding the Logic Behind the Manipulation☆37Jul 28, 2025Updated 7 months ago
- ¿Sospechas que un archivo podría contener información oculta o maliciosa? Ésta herramienta de análisis avanzado escanea PDFs, documentos …☆21Apr 2, 2025Updated 11 months ago
- Free BugBounty KrazePlanetTraining☆56Dec 17, 2025Updated 2 months ago
- AI-powered transcription for audio & video with Whisper — self-hosted, fast, and open-source.☆107Aug 18, 2025Updated 6 months ago
- Integrate LLM models directly into Ghidra for automated code refactoring and analysis.☆246Dec 16, 2025Updated 2 months ago
- Companion repo for A Complete Guide to Mastering OSINT (2025). Includes free templates ($5,000 value), latest 2025 OSINT tools, and resou…☆64Aug 29, 2025Updated 6 months ago
- An all-in-one Shodan & ZoomEye supported tool to search, browse, preview and dump data leakage across 20+ services. Pulls real exposure s…☆53Dec 1, 2025Updated 3 months ago
- BurnWP Advanced Exploiter System instead Scanner & Custom Plugin for Pentester☆87Oct 5, 2025Updated 4 months ago
- Python scripts and tools built during my learning journey☆31Nov 14, 2025Updated 3 months ago
- Fast IP Lookups for Open Ports and Vulnerabilities from API internetdb shodan☆29Feb 3, 2022Updated 4 years ago
- EPH is a tool which allows you to perform scans to find exposed administration panels that can lead to security vulnerabilities.☆19Jul 17, 2022Updated 3 years ago