☆19Sep 1, 2022Updated 3 years ago
Alternatives and similar repositories for Dark-Telegram
Users that are interested in Dark-Telegram are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bug Bounty Platforms☆26Oct 17, 2024Updated last year
- Reference of Vehicle Security。☆13Aug 13, 2021Updated 4 years ago
- EWE (Execution Workflow Engine) - Execute tasks in a structured workflow parallel, fast, organized. Designed for automation, recon workfl…☆21Aug 8, 2025Updated 7 months ago
- Tool to extract all subdomains from crt.sh search using RegEx and Web Scraping☆21Jan 5, 2024Updated 2 years ago
- ☆20Aug 27, 2025Updated 6 months ago
- 2019年红队资源链接,资源不是本人整理出来,来自互联网,因为流传的少,特意在此做个备份,做个分享。☆16Aug 24, 2019Updated 6 years ago
- A BASH Script to automate the installation of the most popular bug bounty tools☆26Dec 24, 2025Updated 3 months ago
- ☆63Jul 14, 2025Updated 8 months ago
- 一个网络工具集。具有内网穿透(INTRANET PENETRATION)、反向代理(REVERSE PROXY)、HTTP代理(HTTP PROXY)等功能。☆11Oct 25, 2023Updated 2 years ago
- ☆18Nov 25, 2025Updated 4 months ago
- pocsuite3 poc合集☆14Oct 16, 2022Updated 3 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20May 27, 2020Updated 5 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Jan 25, 2024Updated 2 years ago
- Quickly collect data from thousands of exposed Elasticsearch or Kibana instances and generate a report to be analysed.☆30Jan 7, 2022Updated 4 years ago
- Template para proyectos de Pentesting y registrar el contenido en un Vault de Obsidian☆14Aug 5, 2021Updated 4 years ago
- ☆37Dec 26, 2021Updated 4 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆16Jun 30, 2020Updated 5 years ago
- Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x up to linux kernel 6.8 on x86_64, hides files, hides process, hides bind shell …☆18Feb 15, 2026Updated last month
- Import Device Tree Information onto your Ghidra memory map☆32Mar 10, 2026Updated 2 weeks ago
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆20May 26, 2021Updated 4 years ago
- Mockingjay Process Injection Vulnerable DLL Finder☆19Jun 30, 2023Updated 2 years ago
- Lab for learning JWT.☆34Jan 19, 2023Updated 3 years ago
- ☆13Dec 7, 2022Updated 3 years ago
- Exam Report Template - eWPT☆24Oct 18, 2021Updated 4 years ago
- Tool that reproduces CVE-2025-55315 in ASP.NET Core.☆46Jan 12, 2026Updated 2 months ago
- WinRAR 0day CVE-2025-8088 PoC RAR Archive☆46Aug 12, 2025Updated 7 months ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- Attack Surface Discovery Tool☆110Sep 17, 2024Updated last year
- ☆41Aug 12, 2022Updated 3 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- EPH is a tool which allows you to perform scans to find exposed administration panels that can lead to security vulnerabilities.☆20Jul 17, 2022Updated 3 years ago
- A mutliple tactics to execute shellcode in go :}☆23Apr 21, 2025Updated 11 months ago
- CORSER is a Golang CLI Application for Advanced CORS Misconfiguration Detection☆60Oct 26, 2024Updated last year
- ☆22Feb 3, 2024Updated 2 years ago
- ☆26Feb 21, 2026Updated last month
- GeoIP plotting script written in Python to help security teams draw visualized reports from IP addresses☆20May 29, 2022Updated 3 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆11Sep 22, 2023Updated 2 years ago
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆163Jul 2, 2024Updated last year