TaurusOmar / pulsegramLinks
Integrated keylogger with telegram
☆16Updated 7 months ago
Alternatives and similar repositories for pulsegram
Users that are interested in pulsegram are comparing it to the libraries listed below
Sorting:
- A comprehensive automation script for penetration testing and reconnaissance.☆36Updated 10 months ago
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆27Updated 6 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- Herramienta para detectar correos de phishing mediante análisis DKIM, SPF, y WHOIS☆29Updated 9 months ago
- Algunos #OSINT_TIPS para sus excelentes investigaciones en fuentes abiertas (#OSINT). Hello! I share some #OSINT_TIPS for your excellent …☆25Updated last year
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆22Updated 9 months ago
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Updated 5 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆56Updated last year
- Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured sys…☆45Updated 10 months ago
- Pentest/Red Team: Resources, repos and scripts.☆69Updated this week
- Msfvenom Advanced Obfuscated Payload Builder.☆24Updated this week
- Automatic reverse/bind shell generator cheat sheet.☆35Updated 2 years ago
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆31Updated 8 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆169Updated 11 months ago
- ☆18Updated 6 months ago
- Este proyecto implementa un poderoso túnel SSH totalmente anónimo utilizando la red Tor y múltiples proxies intermedios. Permite enrutar …☆14Updated last year
- Tool for automate bug hunting process 🔍 --> 🍭☆41Updated 10 months ago
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆62Updated last year
- wp-config-scan☆79Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- on-the-fly☆84Updated last year
- Nmap & SQL injection automation tool☆34Updated 7 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆45Updated 10 months ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆103Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- PassBreaker☆61Updated last year
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆53Updated 5 months ago
- CVE-2024-28955 Exploitation PoC☆34Updated 11 months ago
- ☆11Updated 4 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 10 months ago