☆28Sep 10, 2022Updated 3 years ago
Alternatives and similar repositories for Evil-Storm
Users that are interested in Evil-Storm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- Extendable Python script handler for automating penetration testing.☆39Mar 3, 2023Updated 3 years ago
- Personally developed tools for buffer overflow attacks☆24Sep 25, 2022Updated 3 years ago
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆83Sep 15, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Updated this week
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to prevent targeted passw…☆33Mar 4, 2023Updated 3 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- All in one tool to make your hacking easier.☆199Mar 7, 2022Updated 4 years ago
- AXIS Botnet☆17May 16, 2024Updated last year
- [EN] BETA: Layla - recon tool for bug bounty☆75Feb 9, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Powerful and smart Traffic Anonymizer using tor as a transparent proxy☆34May 24, 2025Updated 10 months ago
- An OSINT focused tool made with Nodejs!☆100Oct 4, 2022Updated 3 years ago
- DarkSpy facilitates a secure and educational environment to comprehend the mechanics of establishing connections between two machines. Th…☆52Jan 20, 2026Updated 2 months ago
- ☆132Jan 25, 2023Updated 3 years ago
- Secure Hacker - Admin Panel Detector☆19Mar 26, 2018Updated 8 years ago
- WARF is a Web Application Reconnaissance Framework that helps to gather information about the target.☆193Dec 27, 2022Updated 3 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Updated this week
- 🐳 VMs are bloat. Dockerise your VAPT environment☆80Apr 19, 2025Updated 11 months ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆72Oct 2, 2023Updated 2 years ago
- A collection of pentesting web scanners☆37Mar 22, 2024Updated 2 years ago
- Python script for automating the download of nessus reports☆27Aug 3, 2022Updated 3 years ago
- A fast, lightweight botnet written in pure C.☆42Nov 10, 2021Updated 4 years ago
- ssshh its a secret ;)☆21Mar 7, 2022Updated 4 years ago
- Red Team Server (RTS)☆16Mar 8, 2024Updated 2 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- ☆25Aug 19, 2024Updated last year
- A script for sniffing internet traffic between a machine and the gateway in your local network.☆18Dec 26, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Application for administer multidomain Active Directory-based networks☆29Dec 4, 2025Updated 4 months ago
- Thanatos.☆16Apr 29, 2021Updated 4 years ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Mar 16, 2023Updated 3 years ago
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆32Nov 3, 2023Updated 2 years ago
- ☆10Jan 5, 2024Updated 2 years ago
- An ADB-based botnet written in C.☆46May 3, 2022Updated 3 years ago
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆110Jul 31, 2023Updated 2 years ago