SchenLong / PorungaLinks
Aerial platform for Recon, Intelligence and Pentesting. #R-KALI #Porunga
☆16Updated 7 years ago
Alternatives and similar repositories for Porunga
Users that are interested in Porunga are comparing it to the libraries listed below
Sorting:
- Shodan.io Command Line Interface☆43Updated 4 years ago
- Social Engineering template for credential harvesting. (Facebook as an example).☆45Updated 7 years ago
- This tool will harvest valid DNS subdomains from a given domain.☆75Updated 3 years ago
- A repo for collecting and organizing security tools of various types. As new ones come out, they get added to the list.☆102Updated 3 years ago
- A framework for secure and scalable network traffic analysis - https://netcap.io☆17Updated 6 years ago
- Package manager for hackers built by hackers☆36Updated 7 years ago
- wifi attacks suite☆59Updated 5 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Updated 7 years ago
- Social Engineering Tool Oriented to facebook☆58Updated 8 years ago
- A simple script for translating IP addresses to GeoLocations☆51Updated 3 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆35Updated 8 years ago
- Massive arsenal of hacker tools...☆79Updated 8 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆54Updated last year
- NAT Pinning exploit tool for penetration testers.☆34Updated 12 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 10 years ago
- Python util to retrieve full display name and profile picture from a single email address☆102Updated 4 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆47Updated 10 years ago
- Attacking WPA/WPA encrypted access point without client.☆51Updated 12 years ago
- Tools and scripts dedicated to Android application security☆52Updated 4 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Updated 8 years ago
- Utilizing various Open Source Intelligence (OSINT) tools and techniques that we have found to be effective, DataSploit brings them all in…☆31Updated 8 years ago
- Maltego Local Transforms for Facebook☆75Updated 8 years ago
- Brute force attack against WPS, that actually works☆47Updated 6 years ago
- ParrotSec rootfs arm (armhf at the moment) builder.☆17Updated 8 years ago
- ARP spoof then session jack within your browser☆28Updated 11 years ago
- Grabb CCTV all Type (foscam , axis , sony , ..)☆78Updated 7 years ago
- A Python Script To Automatically Download, Provision and Update a Kali Linux VM in Virtualbox☆47Updated 5 years ago
- Show info about the author by facebook photo url☆40Updated 8 years ago
- Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4☆20Updated 8 years ago
- WiFi Pineapple DIY☆79Updated 8 years ago