SirCryptic / ThreatHunterLinks
checks various security features of a system, including firewall, intrusion detection system (IDS),Intrusion Prevention Systems (IPS), Network Security Groups (NSG) antivirus, log4js & More.
☆10Updated 2 years ago
Alternatives and similar repositories for ThreatHunter
Users that are interested in ThreatHunter are comparing it to the libraries listed below
Sorting:
- bash script to automate wardriving tasks. (Wi-Fi & Bluetooth)☆9Updated 2 years ago
- Reverse And Dorking Tools☆25Updated 4 years ago
- this tool can deploy malware using wifi that it can be downloaded by the user.☆13Updated last year
- A very user friendly and advanced phishing toolkit made for hackers☆29Updated 3 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆79Updated 5 months ago
- 🔥Ready, Aim, Fire.🔥☆16Updated 3 years ago
- An extreme encryption for everyone, encrypt your text before sending to anyone. Alphabets and numbers are going to be encrypted like a he…☆13Updated 10 months ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆15Updated last year
- create fully undetectable payload☆16Updated 2 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆23Updated 4 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- Automatic XSS Vulnerability Scanner, Dorker, and Payload Injector☆22Updated 8 months ago
- ☆19Updated last year
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆35Updated 5 years ago
- it's a powerful and effective tool for attacking Wi-Fi networks and it supports many different attacks☆16Updated last year
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆9Updated last year
- Effortlessly Find Comprehensive Information on Individuals with Our dedsec People Search Tool!☆26Updated last month
- Virus Spreader, Hack windows (nc shell=default), Os_deletion☆9Updated 4 years ago
- This is a simple web application vulnerability scanner that checks if a given URL or IP address is vulnerable to 36 common web applicatio…☆23Updated last month
- OSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accu…☆19Updated 3 years ago
- CamJacking is a tool designed for use in human penetration testing tool. It is intended to simulate potential security threats by testing…☆19Updated 11 months ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆23Updated 4 years ago
- USB Rubber Ducky Script, Dransomware is ransomware which will encrypt data without root privileges.☆17Updated 3 years ago
- A small tool to find admin panel of the website☆14Updated 2 years ago
- B-UAC, Windows UAC Bypass Trojan Generator☆8Updated 6 years ago
- Facebook bot dumper&scraper☆34Updated 7 months ago
- Disconnect all WiFi clients with dedsec tool, you can easily disconnect all WiFi clients from a network. anonymouse mode feature (random …☆21Updated 11 months ago
- An highly customizable DOS tool with port scanner☆8Updated last year
- Cracking protocols FTP and SSH.☆12Updated 10 months ago