Tyrant is a malicious tool used for penetration testing and remote control persistence.
☆39Feb 3, 2025Updated last year
Alternatives and similar repositories for Tyrant
Users that are interested in Tyrant are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Escáner básico de vulnerabilidades web (XSS, SQLi, cabeceras) con crawling ligero, escrito en Python.☆13Mar 4, 2026Updated 2 weeks ago
- facebook bruteforce tool☆10Dec 3, 2023Updated 2 years ago
- ☆28Apr 2, 2021Updated 4 years ago
- A tool to grab session cookies of any website from an android phone and by-pass 2FA.☆11May 8, 2020Updated 5 years ago
- Red Team Scaner☆58Nov 25, 2025Updated 3 months ago
- Herramienta de extracción de exploits desde Shodan Exploits para facilitar la búsqueda de vulnerabilidades conocidas. 👁☆39Sep 20, 2025Updated 6 months ago
- Herramienta de BugBounty atutomatizada☆42Feb 27, 2026Updated 3 weeks ago
- Automation of some MAPT activities and interaction with the mobile Android device.☆26Sep 28, 2025Updated 5 months ago
- BookMark and Find Subdomains, Endpoints, External Domains in your web browser.☆28Aug 1, 2025Updated 7 months ago
- command control framework☆33Updated this week
- Camera phishing screen (to take photos from the front and rear cameras)☆68Nov 20, 2025Updated 4 months ago
- This suite of nodes unlocks high-performance parallel processing in ComfyUI by utilizing **Model Replication**. Unlike standard offloadin…☆42Feb 24, 2026Updated last month
- Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerability☆10Jul 12, 2024Updated last year
- An interactive Bash-based network scanning tool that provides live host discovery, port scanning, traceroute, and ping tests, featuring v…☆81Apr 3, 2025Updated 11 months ago
- 🕷️ n8n Community Node for Scrappey API – Automate web scraping and data extraction with advanced anti-bot blocking technology, seamlessl…☆16Feb 2, 2026Updated last month
- Generate Emails and Usernames from Provided Lists of Names.☆10Jun 14, 2024Updated last year
- ☆14Mar 27, 2019Updated 6 years ago
- Bot verifies a mobile phone number activity status by HLR-lookup. The request is processed by the communication operator without reaching…☆16Jan 25, 2022Updated 4 years ago
- ☆21Aug 6, 2025Updated 7 months ago
- CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection☆17Jan 12, 2025Updated last year
- ☆18Sep 27, 2025Updated 5 months ago
- ☆18Aug 13, 2021Updated 4 years ago
- ScanKDea es un escáner de seguridad avanzado en Python diseñado para profesionales de ciberseguridad y auditorías éticas. Ofrece capacida…☆23May 30, 2025Updated 9 months ago
- A simple bash script that monitor your server (high cpu and ram usage, systemctl services status, free disk space) and send an alert to t…☆16Feb 17, 2025Updated last year
- A simple local service to paste text from your phone to the clipboard of a remote computer☆48Jan 29, 2026Updated last month
- WebSift is an OSINT ethical hacking tool designed to scrape and extract emails, phone numbers, and social media links or other URLs from …☆489Feb 24, 2026Updated last month
- A lightweight OSINT tool for performing WHOIS checks, DNS lookups, email harvesting, and social media scanning.☆26Jun 6, 2025Updated 9 months ago
- SMS flooding tool☆23May 3, 2025Updated 10 months ago
- A simple tool to help you discover admin panels on websites.☆36Jul 25, 2025Updated 8 months ago
- ☆59Dec 10, 2025Updated 3 months ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152