Morronel / stalker-labLinks
☆26Updated 10 months ago
Alternatives and similar repositories for stalker-lab
Users that are interested in stalker-lab are comparing it to the libraries listed below
Sorting:
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆172Updated last week
- Репозиторий содержит список вопросов по наступальной безопасности.☆350Updated 2 weeks ago
- Modern web-based distributed hashcracking solution, built on hashcat☆147Updated this week
- ☆133Updated 4 years ago
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆38Updated last year
- A monster cheatsheet on MITM attacks☆367Updated 5 months ago
- Hackings style defence tricks☆51Updated last week
- Friendly graphical output of the nmap tool that allows filtering by open ports☆187Updated 3 years ago
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆179Updated last year
- Free educational courses in reverse engineering, malware analysis, and programming☆464Updated 2 months ago
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆28Updated 7 months ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆101Updated this week
- File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-2…☆136Updated last year
- Light-weight web security scanner☆150Updated 8 months ago
- A bash script for performing advanced Google dork searches to find files, names, usernames, emails, phone numbers, and images.☆27Updated last year
- The DNA test for websites☆74Updated last week
- Proof-of-Concept найденной уязвимости в телеграме. Телеграм бот для отслеживания переходов по ссылке.☆23Updated last year
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Updated 11 months ago
- Cisco IOS Security Inspector☆37Updated 3 weeks ago
- Reverse proxies cheatsheet☆25Updated 2 years ago
- All in 1 phishing framework☆38Updated 3 years ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆274Updated last year
- Ресурсы, связанные с безопасностью приложений, исследователями и разработчиками в области безопасности.☆51Updated 3 years ago
- Maltego Transforms for OSINT on Telegram Messenger☆370Updated 2 months ago
- A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features cus…☆439Updated last month
- Local encrypt and decrypt telegram messages using secret keys.☆39Updated last year
- Country/Provider to IPv4 Reverse Lookup☆30Updated last week
- ☆380Updated 5 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆437Updated 2 months ago
- ☆166Updated last year