This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based on country of origin, sex and how common the combination of surname and firstname can be.
☆13Feb 6, 2023Updated 3 years ago
Alternatives and similar repositories for genAvatar
Users that are interested in genAvatar are comparing it to the libraries listed below
Sorting:
- Website of ENSET Mohammedia Clubs☆10Feb 10, 2022Updated 4 years ago
- Advance phishing tool☆13Sep 25, 2020Updated 5 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- This Is A Python Script That Forwards SMS Messages To A Discord Webhook☆10Feb 22, 2024Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Sep 25, 2020Updated 5 years ago
- Create anonymous components to use hooks anywhere in your render tree.☆11Sep 14, 2022Updated 3 years ago
- Telegram phishing is for testing purposes only and the security of users is responsible for any misuse☆10Feb 20, 2021Updated 5 years ago
- ☆12Oct 20, 2018Updated 7 years ago
- Multi-Mail-Sender☆10Dec 1, 2020Updated 5 years ago
- (Hacking-Tool), All tools in one!☆13Jul 5, 2021Updated 4 years ago
- Spring Framework RCE (Quick pentest notes)☆17Apr 7, 2022Updated 3 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- A simple service to handle processing of crypto payments.☆11Dec 11, 2022Updated 3 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25May 4, 2024Updated last year
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- Linux Cyber Warfare Distro☆21Dec 16, 2025Updated 3 months ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆20Aug 19, 2025Updated 7 months ago
- By LodCam tool you can generat phishing link of Loding site which can catch victim picture by victim front camera and and also gives you …☆20Aug 22, 2020Updated 5 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- Camera Hack bot - Powered by XPH4N70M☆24May 26, 2023Updated 2 years ago
- EXTREME PROXY HARVESTER AND CHECKER By Jeff Childers Harvest and Check Free Proxies. Check For Alive and Anonymous Proxies. This Requir…☆16Dec 7, 2017Updated 8 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- Burp Suite Certified Practitioner Exam Study☆18Feb 8, 2023Updated 3 years ago
- This tool is used to find the admin login page of a website.☆16Jan 15, 2021Updated 5 years ago
- Black-Tool-For-Windows☆15Sep 8, 2021Updated 4 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- A Simple but Strong DDoS tool used for taking out websites with certain security issues.☆15Feb 26, 2024Updated 2 years ago
- CyberSecurity Resources and Tools☆28Jun 24, 2024Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆40Feb 24, 2023Updated 3 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Aug 8, 2022Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- +300 TOOLS in 1! IN ITALIANO☆15Nov 15, 2022Updated 3 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆22Sep 18, 2024Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year