Quantika14 / email-prediction-asterisksView external linksLinks
☆72Apr 24, 2023Updated 2 years ago
Alternatives and similar repositories for email-prediction-asterisks
Users that are interested in email-prediction-asterisks are comparing it to the libraries listed below
Sorting:
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Sep 13, 2021Updated 4 years ago
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆240Jul 3, 2024Updated last year
- BoB Web Application Security Project☆220Dec 14, 2025Updated last month
- The purpose of this script is to automate the web enumeration process and search for exploits☆114Apr 19, 2022Updated 3 years ago
- Download all of a given user's public Pastebin pastes☆32Apr 16, 2025Updated 9 months ago
- Passive-Recursive DNS daemon☆26Sep 20, 2024Updated last year
- Enumerate AWS cloud resources based on provided credential☆51May 11, 2022Updated 3 years ago
- Integrate GoKart security static analysis to GitHub Actions☆10Jan 11, 2023Updated 3 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago
- RTF Crash POC Python 3.11 Windows 10☆46Mar 7, 2023Updated 2 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Aug 29, 2020Updated 5 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆15May 22, 2023Updated 2 years ago
- ☆33Aug 29, 2022Updated 3 years ago
- Red Team C2 and Post Exploitation code☆34Jul 8, 2025Updated 7 months ago
- Python3 tool to perform password spraying using RDP☆16Aug 14, 2023Updated 2 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- Geolocate your files!☆16Jan 7, 2022Updated 4 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- ⚡ Create infinite UAC prompts forcing a user to run as admin ⚡☆248Sep 23, 2022Updated 3 years ago
- 🚪 Quick & dirty Wordpress Command Execution Shell☆66Jan 24, 2022Updated 4 years ago
- This is Advance Phishing Tool ! OTP PHISHING☆35Jun 27, 2022Updated 3 years ago
- Unicode encoding attacks with machine learning☆98Nov 25, 2021Updated 4 years ago
- Chromiux is a python based console app that extracts the encrypted saved passwords/cookies in txt format of chrome browser.☆19May 14, 2021Updated 4 years ago
- A redteam tool to obfuscate IPv4 addresses to evade AV or Application Firewalls☆18Mar 18, 2020Updated 5 years ago
- Gmail shell, for hackers execute commands via gmail☆19Feb 3, 2021Updated 5 years ago
- A backdoor with a multitude of features.☆292Oct 3, 2024Updated last year
- WebSetting☆16Jul 19, 2022Updated 3 years ago
- ☆19Dec 15, 2018Updated 7 years ago
- Windows Malware Probe of Concept☆21Jun 20, 2022Updated 3 years ago
- This repository is an overview of what resources you need in cybersecurity which we called infosec and a collection of hacking tools, res…☆19Nov 16, 2023Updated 2 years ago
- Network Traffic Fuzzer☆17Dec 28, 2024Updated last year
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 8 months ago
- PoC code from blog☆16Mar 10, 2020Updated 5 years ago
- Web Service write in Python for control and protect your android device remotely.☆191Dec 14, 2022Updated 3 years ago
- Linux Persistence Toolkit☆73Sep 27, 2022Updated 3 years ago
- PowerShell Clipboard Data Transfer☆73Dec 29, 2025Updated last month