Morronel / stalker-labLinks
☆26Updated last year
Alternatives and similar repositories for stalker-lab
Users that are interested in stalker-lab are comparing it to the libraries listed below
Sorting:
- ☆136Updated 4 years ago
- MITM Field Manual☆368Updated 3 weeks ago
- Hackings style defence tricks☆58Updated last month
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆177Updated this week
- Репозиторий содержит список вопрос ов по наступальной безопасности.☆355Updated 3 months ago
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆41Updated last year
- Free educational courses in reverse engineering, malware analysis, and programming☆473Updated 5 months ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆105Updated 2 months ago
- Friendly graphical output of the nmap tool that allows filtering by open ports☆185Updated 3 years ago
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆185Updated last year
- Modern web-based distributed hashcracking solution, built on hashcat☆189Updated last week
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆29Updated 2 months ago
- Light-weight web security scanner☆150Updated 2 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup XSS Forum☆38Updated 6 months ago
- Reverse proxies cheatsheet☆24Updated 2 years ago
- https://t.me/+V6d8SvKVFXo2MjIy☆41Updated 2 years ago
- 🔎 OSINT Maltego Transforms for investigating Telegram channels, groups, and users, including deanonymization via stickers, forwarded mes…☆409Updated 3 weeks ago
- The DNA test for websites☆74Updated 2 months ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆93Updated last year
- Proof-of-Concept найденной уязвимости в телеграме. Телеграм бот для отслеживания переходов по ссылке.☆25Updated last year
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆275Updated 3 months ago
- Cisco IOS Security Inspector☆40Updated last month
- This repository contain a CheatSheet for OSWP & WiFi Cracking.☆336Updated 3 years ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆506Updated 5 months ago
- ☆566Updated last year
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆275Updated last year
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆218Updated 10 months ago
- Finding secrets in various (non-text) popular files.☆51Updated 3 months ago
- Local encrypt and decrypt telegram messages using secret keys.☆39Updated last year
- ☆352Updated 2 years ago