An all-in-one briefcase for pentesting, OSINT and radio exploration
☆81Jul 2, 2019Updated 6 years ago
Alternatives and similar repositories for NightPi
Users that are interested in NightPi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- hcidump for android☆11Jan 28, 2015Updated 11 years ago
- Android Application of RTLion Framework☆22Jan 24, 2020Updated 6 years ago
- A tool for ethical hackers and only for cyber security experts this tool is made for Whatsapp phishing only for education purpose use it …☆31Jan 24, 2026Updated 2 months ago
- 🗜️ A custom standing desk that you can control from the command line.☆16Nov 28, 2017Updated 8 years ago
- ☆39Feb 28, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Steps on how to install Kali NetHunter to Nexus 6P (Angler) running Nougat 7.1.1☆15Jul 21, 2019Updated 6 years ago
- A Phishing WIFI Rogue Captive Portal!☆43Feb 12, 2019Updated 7 years ago
- 📒 Quick script to generate a table of contents from a markdown document☆16Apr 15, 2023Updated 3 years ago
- Docker image for osint☆137Jan 2, 2022Updated 4 years ago
- PSEmailRep is a simple PowerShell module to interface with the EmailRep.io API.☆27Oct 14, 2020Updated 5 years ago
- A curated list of blockchain security Capture the Flag (CTF) competitions☆15Jan 31, 2021Updated 5 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- BLE based C2 for Hak5's Bash Bunny☆19Oct 31, 2023Updated 2 years ago
- Report and finding templates used by the Serpico reporting tool☆16Sep 26, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- recon-ng modules for Censys☆37Oct 23, 2023Updated 2 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 3 years ago
- Find endpoints in archived versions of robots.txt☆14Nov 21, 2019Updated 6 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆17Sep 11, 2012Updated 13 years ago
- Import ADS-B data into OwnTracks via MQTT☆12Sep 30, 2016Updated 9 years ago
- FEAT, short for Factcheck Explorer Analysis Tool, is designed to facilitate the exploration, analysis, and visualization of fact-checking…☆32Apr 11, 2024Updated 2 years ago
- ☆14Nov 21, 2022Updated 3 years ago
- An OSINT tool to easily generate Facebook url's to access publicly available information from Facebook profiles☆12Feb 22, 2017Updated 9 years ago
- HTTP Headers Security Cheat Sheet☆13Sep 25, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- WAScan - Web Application Scanner☆19Mar 22, 2018Updated 8 years ago
- An Automated Database Hacking Software with Database Dorks Hacking☆30Sep 7, 2019Updated 6 years ago
- Parametric sweep of simulated microbial communities and metagenomic sequencing.☆11Jul 15, 2022Updated 3 years ago
- MQTT subscribe to mutliple servers / topics simultaneously☆21Feb 11, 2020Updated 6 years ago
- ☆15Feb 17, 2021Updated 5 years ago
- Ubertooth library for Android☆40Nov 11, 2012Updated 13 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Combining OSINT sources in Elastic Stack☆78Oct 10, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A collection of Kode Dot Projects ready to use☆24Nov 19, 2025Updated 5 months ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 6 years ago
- ☁️ Cloud native cats with prometheus metrics, kubernetes ready and cute as hell 🐈☆15Dec 7, 2018Updated 7 years ago
- want to remove sensitive data from photos or even view it? use autoexif to easily help you do that no more remembering syntaxs with this …☆40Apr 23, 2025Updated 11 months ago
- docker files for Pleroma (Unofficial)☆11Mar 22, 2018Updated 8 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆13Aug 30, 2022Updated 3 years ago
- Upload this sketch to any Arduino and break into millions of Onity hotel locks worldwide. DC (coaxial) barrel connector required. For mor…☆25Sep 4, 2017Updated 8 years ago