SleepTheGod / ChatGPTLinks
Chat GPT Things by Taylor Newsome
☆12Updated last year
Alternatives and similar repositories for ChatGPT
Users that are interested in ChatGPT are comparing it to the libraries listed below
Sorting:
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Updated 2 years ago
- ☆14Updated 4 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆15Updated 9 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆41Updated 2 years ago
- Build wordlists from the common-crawl index☆12Updated 3 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 3 years ago
- Search Google Dorks like Chad. / Broken link hijacking tool.☆30Updated 2 months ago
- || Activate Burp Suite Pro with Loader and Key-Generator ||☆42Updated 4 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆22Updated 3 weeks ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆27Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated 3 weeks ago
- A utility to quickly map IP addresses to their respective ASN☆20Updated 2 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- ☆18Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13Updated 8 years ago
- PoC for the CVE-2021-20837 : RCE in MovableType☆18Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21Updated 3 years ago
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using mailg…☆26Updated last year
- Legba recipes.☆51Updated last year