This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based on country of origin, sex and how common the combination of surname and firstname can be.
☆13Feb 6, 2023Updated 3 years ago
Alternatives and similar repositories for genAvatar
Users that are interested in genAvatar are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Website of ENSET Mohammedia Clubs☆10Feb 10, 2022Updated 4 years ago
- Advance phishing tool☆13Sep 25, 2020Updated 5 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- This Is A Python Script That Forwards SMS Messages To A Discord Webhook☆11Feb 22, 2024Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Sep 25, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Create anonymous components to use hooks anywhere in your render tree.☆11Sep 14, 2022Updated 3 years ago
- Telegram phishing is for testing purposes only and the security of users is responsible for any misuse☆10Feb 20, 2021Updated 5 years ago
- ☆12Oct 20, 2018Updated 7 years ago
- Multi-Mail-Sender☆10Dec 1, 2020Updated 5 years ago
- (Hacking-Tool), All tools in one!☆13Jul 5, 2021Updated 4 years ago
- Spring Framework RCE (Quick pentest notes)☆17Apr 7, 2022Updated 4 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- A simple service to handle processing of crypto payments.☆11Dec 11, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25May 4, 2024Updated last year
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- Linux Cyber Warfare Distro☆21Dec 16, 2025Updated 3 months ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆20Aug 19, 2025Updated 7 months ago
- By LodCam tool you can generat phishing link of Loding site which can catch victim picture by victim front camera and and also gives you …☆21Aug 22, 2020Updated 5 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Camera Hack bot - Powered by XPH4N70M☆26May 26, 2023Updated 2 years ago
- EXTREME PROXY HARVESTER AND CHECKER By Jeff Childers Harvest and Check Free Proxies. Check For Alive and Anonymous Proxies. This Requir…☆16Dec 7, 2017Updated 8 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 6 years ago
- This tool is used to find the admin login page of a website.☆16Jan 15, 2021Updated 5 years ago
- Black-Tool-For-Windows☆15Sep 8, 2021Updated 4 years ago
- Burp Suite Certified Practitioner Exam Study☆19Feb 8, 2023Updated 3 years ago
- A Simple but Strong DDoS tool used for taking out websites with certain security issues.☆15Feb 26, 2024Updated 2 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- CyberSecurity Resources and Tools☆30Jun 24, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆40Feb 24, 2023Updated 3 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Aug 8, 2022Updated 3 years ago
- +300 TOOLS in 1! IN ITALIANO☆15Nov 15, 2022Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆22Sep 18, 2024Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year