MartinxMax / TyrantLinks
Tyrant is a malicious tool used for penetration testing and remote control persistence.
☆34Updated 11 months ago
Alternatives and similar repositories for Tyrant
Users that are interested in Tyrant are comparing it to the libraries listed below
Sorting:
- Admin Directory Finder is a tool designed to scan and identify directories under admin paths, such as admin/dashboard.php. It helps in se…☆33Updated 4 months ago
- automated Open Source Intelligence gathering☆180Updated last month
- X-snifer is a versatile tool designed for scanning and gathering information from a website and simplifying various website analysis and …☆82Updated 3 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆144Updated last year
- BurnWP Advanced Exploiter System instead Scanner & Custom Plugin for Pentester☆81Updated 3 months ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆32Updated 9 months ago
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆34Updated last month
- PacketSpy☆157Updated last year
- ☆15Updated 9 months ago
- An interactive Bash-based network scanning tool that provides live host discovery, port scanning, traceroute, and ping tests, featuring v…☆63Updated 9 months ago
- Laravel RCE Exploitation Toolkit☆48Updated 2 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆68Updated 5 months ago
- AutoPentestX – Linux Automated Pentesting & Vulnerability Reporting Tool☆74Updated last month
- A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.☆272Updated last month
- Drana-Infinity is a locally hosted advanced AI assistant designed and developed by IHA089. It’s built specifically for cybersecurity, eth…☆152Updated last month
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Updated last week
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆177Updated last year
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆126Updated 8 months ago
- Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and m…☆26Updated 5 months ago
- Passive leak enumeration tool.☆140Updated this week
- BlackMail is a tool for creating and sending spoof mail.☆37Updated 2 years ago
- BookMark and Find Subdomains, Endpoints, External Domains in your web browser.☆25Updated 5 months ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆55Updated 7 months ago
- ☆22Updated 6 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆187Updated last year
- Linux-based botnet builder designed for creating advanced botnet payloads.☆105Updated 2 months ago
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆57Updated 9 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Updated last year
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆29Updated last month
- A collection of tools and resources useful for OSINT investigations in the cryptocurrency. This is a dynamic list. —most resources here a…☆75Updated 6 months ago