Your Guide to browse Onine sites
☆160Oct 17, 2024Updated last year
Alternatives and similar repositories for Dark-Web-Full-Guide
Users that are interested in Dark-Web-Full-Guide are comparing it to the libraries listed below
Sorting:
- Bug Bounty Platforms☆26Oct 17, 2024Updated last year
- ☆20Aug 27, 2025Updated 6 months ago
- Arsenal is a Simple shell script (Bash) used to install tools and requirements for Bug Bounty☆285Jun 3, 2024Updated last year
- A simple utility to generate domain names with all possible TLDs☆23Feb 3, 2023Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 4 years ago
- This script reads a text file containing domains, fetches the subdomains from crt.sh☆11May 31, 2023Updated 2 years ago
- An another JWT cracker but really fast!☆11Jan 26, 2023Updated 3 years ago
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- A tool to assist in the development of landing pages for phishing campaigns☆15Oct 3, 2022Updated 3 years ago
- ☆18Sep 24, 2024Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 5 months ago
- Custom Binary Ninja Themes☆12Nov 11, 2023Updated 2 years ago
- ☆38Mar 28, 2025Updated 11 months ago
- ☆12Aug 10, 2022Updated 3 years ago
- ☆19Mar 4, 2023Updated 3 years ago
- Manage your sdks and emulators in a light and simplified way using a webui.☆13Jun 22, 2024Updated last year
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆16Apr 30, 2021Updated 4 years ago
- Checks for tpm vulnerabilities☆38Mar 16, 2023Updated 2 years ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36May 27, 2023Updated 2 years ago
- ☆19Sep 1, 2022Updated 3 years ago
- Documentation of main privilege escalation vulnerabilities affecting Active Directory.☆15Dec 6, 2025Updated 2 months ago
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆219Jul 14, 2024Updated last year
- a vulnerable GraphQL application☆20Dec 13, 2019Updated 6 years ago
- Import Device Tree Information onto your Ghidra memory map☆30Updated this week
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 2 years ago
- ☆66Jan 14, 2023Updated 3 years ago
- A command line tool to interact with Microsoft Graph API☆22May 27, 2024Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆21Feb 12, 2023Updated 3 years ago
- ☆17Jun 14, 2023Updated 2 years ago
- get all nuclei temp from emad shanab repo in one run☆36May 7, 2023Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago
- Easy peasy file uploads☆32Aug 29, 2025Updated 6 months ago
- A standalone Blind XSS Script.☆47Aug 15, 2025Updated 6 months ago
- ☆139Nov 9, 2024Updated last year
- Practical labs, notes, and reports for CEH v13 modules — covering web hacking, network pentesting, malware analysis, social engineering, …☆65Jan 28, 2026Updated last month
- Script to read input from stdin and encode it☆19Aug 23, 2023Updated 2 years ago
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Jan 20, 2023Updated 3 years ago