This is a combination of a hacking and a cracking tool.
☆35May 2, 2021Updated 4 years ago
Alternatives and similar repositories for Kissing-Bug
Users that are interested in Kissing-Bug are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Aug 30, 2021Updated 4 years ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Next generation cyber security research and testing software.☆16Mar 18, 2021Updated 5 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- Python script that automate the process of generating various reverse shells.☆15Mar 22, 2021Updated 5 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated 3 months ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆20Jul 4, 2020Updated 5 years ago
- ☆18Dec 6, 2022Updated 3 years ago
- Web Recon & Exploitation Tool.☆56Mar 8, 2020Updated 6 years ago
- ☆19Apr 3, 2017Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Keylogger that sends Email at a specific time☆10Apr 7, 2018Updated 8 years ago
- Listed below are some extra phishing scenarios for wifiphisher these scenarios are only added to provide security awareness. It may not b…☆15Jul 3, 2017Updated 8 years ago
- Source code for the StealthAssist iOS app. Wirelessly connects your iPhone to the Valentine One radar detector.☆16Oct 17, 2015Updated 10 years ago
- ☆12Oct 7, 2020Updated 5 years ago
- This repository contains the python code of the keylogger which will get all the key hits by the user as well get the content from clipbo…☆12Feb 17, 2023Updated 3 years ago
- Python Key logger that runs in the background and captures key strokes, then emails them to any specified gmail address after a set inter…☆16Aug 10, 2020Updated 5 years ago
- Open Source IOT device software for electric scooters.☆10Jan 5, 2023Updated 3 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- Very Powerful and Easy Automated Web Scanner☆23Feb 2, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Post-exploitation tool for attacking Active Directory domain controllers☆18Dec 18, 2022Updated 3 years ago
- CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability☆21Mar 8, 2022Updated 4 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆17Feb 23, 2021Updated 5 years ago
- xss vulnerability scanner and input fuzzing tool.☆59Apr 8, 2023Updated 3 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated last month
- Powerful & Generic Tools For Ethical Hacking Purposes. Please use for Educational Purposes And Use Metasploitable For Testing & Practicin…☆12Feb 1, 2020Updated 6 years ago
- An embedded bus adapter for various microcontrollers and radios.☆16Dec 16, 2014Updated 11 years ago
- Deploy your own lab of web application penetration testing with docker and docker-compose, webgoat, dvwap, bwapp and Juice Shop☆76Aug 20, 2021Updated 4 years ago
- simple code directory brute☆17Feb 26, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- https://gitlab.com/kalilinux/nethunter/build-scripts/kali-nethunter-project☆13Nov 30, 2020Updated 5 years ago
- A powerful keylogger records all keystrokes including some special keys and send them to gmail.☆13Feb 24, 2022Updated 4 years ago
- ssshh its a secret ;)☆21Mar 7, 2022Updated 4 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Setup HiddenEye Inside Of Termux☆10Jun 9, 2019Updated 6 years ago