R3DRUN3 / sploitcraftLinks
π΄ββ οΈ Hacking Guides, Demos and Proof-of-Concepts π₯·
β198Updated last week
Alternatives and similar repositories for sploitcraft
Users that are interested in sploitcraft are comparing it to the libraries listed below
Sorting:
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offeβ¦β139Updated 2 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β108Updated 2 months ago
- A blind SQL injection brute forcerβ108Updated last month
- Linux post exploitation tool for info gathering and exfiltration π§π‘πβ83Updated 3 months ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.β304Updated this week
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!β245Updated this week
- A collection of Cyber Threat Intelligence information gathered from the depths of the clearnet, deep web and dark web.β125Updated this week
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.β171Updated 7 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making iβ¦β82Updated this week
- Everything from my OSEP study.β124Updated 4 months ago
- OSINT tool to crawl a site and extract useful recon info.β285Updated 5 months ago
- DPULSE - Tool for complex approach to domain OSINTβ124Updated this week
- A deliberately vulnerable banking application designed for practicing secure code reviews and API security testing. Features common vulneβ¦β203Updated last month
- Knowledge Management for Offensive Security Professionals Official Repositoryβ143Updated 3 months ago
- β312Updated last year
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresseβ¦β235Updated 2 weeks ago
- Dredging up secrets from the depths of the file systemβ127Updated 7 months ago
- IoT Camera Reconnaissance and Live Viewerβ146Updated 10 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.β188Updated 3 weeks ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads πͺβ272Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs β¦β247Updated 2 months ago
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the β¦β126Updated last year
- A collection of config files for linux focusing on hackthebox themeβ45Updated 5 months ago
- Discover and monitor internet assets using favicon hashes across search engines.β177Updated 4 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety ofβ¦β389Updated 8 months ago
- AdamsScan is an automated subdomain enumeration script that utilizes multiple popular tools and APIs like Sublist3r, Amass, Subfinder, crβ¦β25Updated 3 months ago
- β183Updated last month
- π LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.β53Updated 5 months ago
- Lab used for workshop and CTFβ240Updated 2 weeks ago
- β477Updated 3 weeks ago