PrettyBoyCosmo / EthicalHacker-EDCLinks
a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series
☆27Updated 4 years ago
Alternatives and similar repositories for EthicalHacker-EDC
Users that are interested in EthicalHacker-EDC are comparing it to the libraries listed below
Sorting:
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆136Updated last year
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆106Updated last year
- 📡 🍍Detects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection…☆39Updated 3 years ago
- Discord bot for the Shodan API - OSINT tool☆82Updated last year
- ☆26Updated 6 months ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆118Updated 2 years ago
- Pentest/Red Team: Resources, repos and scripts.☆78Updated last month
- Xfinity / Comcast Wordlist Generator☆74Updated 2 years ago
- Evil Crow Cable Pro device☆131Updated 2 months ago
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. …☆52Updated last year
- Collection of extra pentest tools for Kali Linux☆112Updated 3 months ago
- Files and Programs for UAV and Drone Cybersecurity Workshop☆37Updated 2 years ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Updated 2 years ago
- Meteorology reports and forecasts, satellite pass predictions, communications decoding, and imagery analysis for NOAA satellites 🌧 🛰 📡☆18Updated 2 years ago
- Crack passwords with Hashcat using a Discord Bot.☆26Updated 2 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆108Updated 2 years ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆45Updated 2 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆53Updated 3 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆34Updated 3 weeks ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻☆21Updated 6 years ago
- Low-cost WarShipping with built-in geofencing, WiFi recon, and Rogue AP on the ESP8266☆46Updated 3 years ago
- Windows Remote Administration Tool that uses Discord as C2☆33Updated 3 years ago
- ☆21Updated 2 years ago
- Random OSINT idea tool thing☆20Updated 2 weeks ago
- OSINT username checker☆44Updated 6 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆64Updated last year
- Social Engineering Browser Update Attack.☆59Updated 2 years ago
- Make your own rubber ducky USB with VBScript and execute any commands you want!☆43Updated 7 months ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆119Updated 2 years ago
- ☆23Updated 6 months ago