OakAtsume / needleLinks
A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.
☆15Updated 2 years ago
Alternatives and similar repositories for needle
Users that are interested in needle are comparing it to the libraries listed below
Sorting:
- Post-Exploitation module for Penetration Tester and Hackers.☆26Updated 3 years ago
- pen testing scripts☆12Updated 4 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆11Updated 4 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 5 years ago
- WebHook for Red Team☆25Updated 4 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Scripts related to offensiveosint.io☆23Updated 5 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 6 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 6 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Updated 3 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Updated 4 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Updated last week
- Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection☆33Updated 2 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- Custom security distro for remote penetration testing☆56Updated 4 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆15Updated 5 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆58Updated 2 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated this week
- Wordlists generated over the years of penetration testing☆13Updated 8 months ago
- Hax is a mini-tool with really useful hacking tools.☆20Updated 2 years ago
- Simple but sharp ransomware☆35Updated 5 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Updated 3 years ago
- AES Ransomware in batch☆11Updated last year
- An automated e-mail OSINT tool☆24Updated 3 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆16Updated 5 years ago
- ☆17Updated 5 years ago
- Transform your batch (bat) script into one binary.exe☆51Updated last year
- A Cross Platform multifunctional (Windows/Linux/Mac) Remote Adminstration Tools.☆25Updated 4 years ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago