PrettyBoyCosmo / PrettyBoyCosmoLinks
☆17Updated last month
Alternatives and similar repositories for PrettyBoyCosmo
Users that are interested in PrettyBoyCosmo are comparing it to the libraries listed below
Sorting:
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆25Updated 3 years ago
- DucKey Logger [Duck Key Logger] is a PowerShell based keylogger for the USB Rubber Ducky. I believe it is currently the most advanced one…☆88Updated last year
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆43Updated last year
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆104Updated 2 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆110Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆49Updated 4 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆46Updated 11 months ago
- Social Engineering Browser Update Attack.☆56Updated last year
- 🤖 The Modern Port Scanner 🤖☆19Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆107Updated 2 years ago
- Automate installation of extra pentest tools on Kali Linux☆57Updated 4 years ago
- Simple HTTP listener for security testing☆16Updated 2 years ago
- Turning smart lights into Wifi Hacking implants.☆123Updated 4 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 11 months ago
- Recopilación de Reglas y Diccionarios para Password Cracking☆27Updated 6 years ago
- ☆20Updated last year
- Evil Crow Cable Pro device☆113Updated 2 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 4 years ago
- This project is a server-side solution for seamless URL redirection when a QR code is scanned. It redirects users to a specified URL and …☆14Updated last month
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- Stuff about it-security that might be good to know☆23Updated 5 years ago
- Xfinity / Comcast Wordlist Generator☆63Updated 2 years ago
- ☆18Updated last week
- capNcook - a dark web exploration tool☆71Updated last year
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. …☆48Updated last year
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- A Powerful Intruder written in Python☆16Updated 3 years ago
- 📡 🍍Detects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection…☆38Updated 3 years ago
- ☆122Updated last year
- Project to implement and automate juice jacking: the stealing of phone data through USB connections☆97Updated 8 years ago