R3DRUN3 / sploitcraftLinks
π΄ββ οΈ Hacking Guides, Demos and Proof-of-Concepts π₯·
β213Updated 3 months ago
Alternatives and similar repositories for sploitcraft
Users that are interested in sploitcraft are comparing it to the libraries listed below
Sorting:
- A blind SQL injection brute forcerβ113Updated 8 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making iβ¦β153Updated last month
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β129Updated 9 months ago
- A collection of config files for linux focusing on hackthebox themeβ53Updated 2 months ago
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.β181Updated last year
- This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.β370Updated last week
- β135Updated 6 months ago
- β44Updated last year
- Quick scripts I developed to streamline OSCP tasksβ200Updated 6 months ago
- β317Updated last year
- NetProbe: Network Probeβ171Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.β92Updated 7 months ago
- Knowledge Management for Offensive Security Professionals Official Repositoryβ150Updated 10 months ago
- π LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.β54Updated last year
- A visual reference of 118 essential red team tools, frameworks & standards, organized like a periodic table. Includes a printable PDF verβ¦β126Updated last month
- Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.β173Updated last week
- A visual methodology tracking platform tailored for offensive security assessmentsβ235Updated 3 months ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware anβ¦β44Updated 9 months ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offeβ¦β164Updated 9 months ago
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket patternβ117Updated 3 months ago
- An archive of 0day.today exploitsβ326Updated 5 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.β131Updated 11 months ago
- Offline Cybersecurity Knowledge Baseβ196Updated 3 weeks ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads πͺβ279Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environmentβ¦β144Updated last year
- Everything from my OSEP study.β180Updated 11 months ago
- Discover and monitor internet assets using favicon hashes across search engines.β220Updated 2 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0β224Updated 4 months ago
- A Powerful Network Reconnaissance Tool for Security Professionalsβ106Updated last year
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.β205Updated last year