This is a combination of a hacking and a cracking tool.
☆36May 2, 2021Updated 5 years ago
Alternatives and similar repositories for Kissing-Bug
Users that are interested in Kissing-Bug are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Aug 30, 2021Updated 4 years ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- This is an advanced keylogger which sends keylog reports every 30 minutes to the specified email on the config file.☆21Aug 19, 2021Updated 4 years ago
- Next generation cyber security research and testing software.☆16Mar 18, 2021Updated 5 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- Python script that automate the process of generating various reverse shells.☆15Mar 22, 2021Updated 5 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated 3 months ago
- Swagger Directory Enumeration (SDE)☆22Jan 16, 2021Updated 5 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆20Jul 4, 2020Updated 5 years ago
- ☆18Dec 6, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Web Recon & Exploitation Tool.☆56Mar 8, 2020Updated 6 years ago
- ☆19Apr 3, 2017Updated 9 years ago
- Keylogger that sends Email at a specific time☆10Apr 7, 2018Updated 8 years ago
- Listed below are some extra phishing scenarios for wifiphisher these scenarios are only added to provide security awareness. It may not b…☆15Jul 3, 2017Updated 8 years ago
- ☆20Jan 19, 2021Updated 5 years ago
- ☆12Oct 7, 2020Updated 5 years ago
- Python Key logger that runs in the background and captures key strokes, then emails them to any specified gmail address after a set inter…☆16Aug 10, 2020Updated 5 years ago
- 🍭 Web Application Vulnerability Scanner 🍭☆16May 21, 2022Updated 3 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Open Source IOT device software for electric scooters.☆10Jan 5, 2023Updated 3 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability☆20Mar 8, 2022Updated 4 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆17Feb 23, 2021Updated 5 years ago
- Powerful & Generic Tools For Ethical Hacking Purposes. Please use for Educational Purposes And Use Metasploitable For Testing & Practicin…☆12Feb 1, 2020Updated 6 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated last month
- hidden ios keystroke logger☆13Feb 6, 2021Updated 5 years ago
- Deploy your own lab of web application penetration testing with docker and docker-compose, webgoat, dvwap, bwapp and Juice Shop☆75Aug 20, 2021Updated 4 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- https://gitlab.com/kalilinux/nethunter/build-scripts/kali-nethunter-project☆13Nov 30, 2020Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Python Script to help/automate the WiFi hacking exercises.☆89Mar 11, 2021Updated 5 years ago
- Setup HiddenEye Inside Of Termux☆10Jun 9, 2019Updated 6 years ago
- ⌨ A keyLogger that sends logs by email, FTP, and ICMP (ping)☆15Jan 21, 2020Updated 6 years ago
- Easy backup mikrotik (.backup) only use BATCH Windows☆16Jan 1, 2022Updated 4 years ago