An all-in-one briefcase for pentesting, OSINT and radio exploration
☆81Jul 2, 2019Updated 6 years ago
Alternatives and similar repositories for NightPi
Users that are interested in NightPi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- hcidump for android☆11Jan 28, 2015Updated 11 years ago
- WiFi Hash Purple Monster, store EAPOL & PMKID packets in an SD CARD using a M5STACK / ESP32 device☆12Aug 27, 2022Updated 3 years ago
- ☆39Feb 28, 2019Updated 7 years ago
- Steps on how to install Kali NetHunter to Nexus 6P (Angler) running Nougat 7.1.1☆15Jul 21, 2019Updated 6 years ago
- Mirror of the NSA Playset Project☆48Feb 2, 2018Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Docker image for osint☆137Jan 2, 2022Updated 4 years ago
- ☆55Apr 4, 2025Updated last year
- Instructions for creating the PumpkinPi a Raspberry Pi based Wireless MiTM device using the Pumkin Framework☆71Sep 20, 2024Updated last year
- A client library to talk to Camect.☆13Jan 13, 2025Updated last year
- ☆16Jan 16, 2022Updated 4 years ago
- PSEmailRep is a simple PowerShell module to interface with the EmailRep.io API.☆28Oct 14, 2020Updated 5 years ago
- An IOC collection for the Cellebrite UFED forensic toolkit.☆24Mar 1, 2021Updated 5 years ago
- A curated list of blockchain security Capture the Flag (CTF) competitions☆15Jan 31, 2021Updated 5 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Senior Design☆12Jan 26, 2025Updated last year
- OCR as a service☆17Dec 11, 2016Updated 9 years ago
- recon-ng modules for Censys☆37Oct 23, 2023Updated 2 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 3 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- Small container runtime for threat detection☆14Apr 13, 2025Updated last year
- A collection of my presentation materials.☆17Apr 29, 2024Updated 2 years ago
- FEAT, short for Factcheck Explorer Analysis Tool, is designed to facilitate the exploration, analysis, and visualization of fact-checking…☆33Apr 11, 2024Updated 2 years ago
- debian installer for parrot security☆30Aug 1, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- An OSINT tool to easily generate Facebook url's to access publicly available information from Facebook profiles☆12Feb 22, 2017Updated 9 years ago
- tools, hacks and stuff for iOS (this is old stuff based on an old iOS version and wasn't tested for functioning on recent iOS devices)☆13Jan 11, 2016Updated 10 years ago
- Create Containerized Clearnet Proxies☆32Apr 21, 2019Updated 7 years ago
- WAScan - Web Application Scanner☆19Mar 22, 2018Updated 8 years ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆17Dec 21, 2024Updated last year
- ☆20May 9, 2023Updated 3 years ago
- A collection of Kode Dot Projects ready to use☆25Nov 19, 2025Updated 5 months ago
- ☆18Jan 2, 2018Updated 8 years ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A Pokémon fan-game for the Nothing Phone 3☆24Nov 1, 2025Updated 6 months ago
- want to remove sensitive data from photos or even view it? use autoexif to easily help you do that no more remembering syntaxs with this …☆40Apr 23, 2025Updated last year
- A tool for securing communications between a client and a DNS resolver☆31Jan 22, 2013Updated 13 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆13Aug 30, 2022Updated 3 years ago
- A simple, intutive, feature rich, php web shell for pen testing.☆14Feb 4, 2020Updated 6 years ago
- Upload this sketch to any Arduino and break into millions of Onity hotel locks worldwide. DC (coaxial) barrel connector required. For mor…☆25Sep 4, 2017Updated 8 years ago
- A Self Contained 500mWatt FT8 HF Transceiver Using SiLabs Si5351 and Si4732 ICs☆21Mar 11, 2023Updated 3 years ago