PHREAKERS-MADHUREH / TSL-OPOK
This config made in Phreakers madhureh
☆8Updated 5 years ago
Related projects: ⓘ
- ☆13Updated this week
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆12Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Updated 2 years ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Updated last month
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Updated 3 years ago
- It is a script written in Python that performs brute force on workers' payroll files through the use of their DNI (National Identity Docu…☆10Updated 3 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆11Updated 2 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Spider or repeater to find all links.☆13Updated 3 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 3 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- A collection of personal ZAP scripts☆13Updated last year
- BDsploit (Big Data Exploitation and Post-exploitation Toolkit)☆5Updated 7 months ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆12Updated 2 years ago
- Python script that automate the process of generating various reverse shells.☆16Updated 3 years ago
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆9Updated 2 years ago
- SIP hacking tools and scripts☆23Updated 3 years ago
- Create machine images containing the Nessus vulnerability scanner☆10Updated last week
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Solution to SIH 22 problem statement Smart Attendance☆7Updated last year
- Alienvault Labs Projects Random Stuff☆16Updated 11 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆16Updated 3 years ago
- Open-source Exploiting Framework☆29Updated 7 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆9Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆25Updated 2 years ago
- The Advanced Automated Pentesting And Forensics Tool☆26Updated 10 months ago
- Yet another powerful payload encoder/decoder☆12Updated 2 years ago