MartinxMax / TyrantLinks
Tyrant is a malicious tool used for penetration testing and remote control persistence.
☆38Updated last year
Alternatives and similar repositories for Tyrant
Users that are interested in Tyrant are comparing it to the libraries listed below
Sorting:
- Drana-Infinity is a locally hosted advanced AI assistant designed and developed by IHA089. It’s built specifically for cybersecurity, eth…☆163Updated 2 months ago
- Admin Directory Finder is a tool designed to scan and identify directories under admin paths, such as admin/dashboard.php. It helps in se…☆33Updated 5 months ago
- automated Open Source Intelligence gathering☆182Updated 2 months ago
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆35Updated 2 months ago
- X-snifer is a versatile tool designed for scanning and gathering information from a website and simplifying various website analysis and …☆83Updated 3 months ago
- A tool for hacking into publicly exposed network cameras, with support for specifying country and region.☆383Updated this week
- POC | Steal user WhatsApp information/data☆75Updated 9 months ago
- Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and m…☆27Updated 6 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆177Updated last year
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆145Updated last year
- PacketSpy☆157Updated last year
- SilverTGOSINT is a Telegram OSINT tool that collects messages from target users in Telegram groups and tracks users who extract data from…☆49Updated 9 months ago
- ☆15Updated 9 months ago
- BurnWP Advanced Exploiter System instead Scanner & Custom Plugin for Pentester☆82Updated 4 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆73Updated 6 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆189Updated last year
- Laravel RCE Exploitation Toolkit☆55Updated 3 months ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆106Updated 3 months ago
- A tool that automates fileless SSH backdoor injection—bypassing CA checks, erasing logs, creating long‑lived (up to 9999 days) passwordle…☆27Updated last week
- An interactive Bash-based network scanning tool that provides live host discovery, port scanning, traceroute, and ping tests, featuring v…☆79Updated 10 months ago
- Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.☆211Updated last month
- Passive leak enumeration tool.☆266Updated this week
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆47Updated this week
- ☆76Updated 2 years ago
- BlackMail is a tool for creating and sending spoof mail.☆37Updated 2 years ago
- Security testing tool for analyzing HTTP 403 responses and identifying access control misconfigurations in web applications.☆166Updated last month
- Here are +200 different rats some with source code☆150Updated 2 years ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆55Updated 8 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆129Updated 8 months ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆112Updated 3 weeks ago