Tsujimar / tsuki-sploit
A USB-based script for Ethical hacking with multiple attacks
☆49Updated last year
Alternatives and similar repositories for tsuki-sploit:
Users that are interested in tsuki-sploit are comparing it to the libraries listed below
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆101Updated last year
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆72Updated 6 months ago
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆41Updated 4 months ago
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆23Updated 3 months ago
- Automate installation of extra pentest tools on Kali Linux☆51Updated 3 years ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆66Updated 11 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆42Updated 3 years ago
- OSINTk.o is a customized Kali Linux-based ISO image with pre-installed packages and scripts☆234Updated last year
- capNcook - a dark web exploration tool☆60Updated 10 months ago
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆24Updated 3 years ago
- WebSift is an OSINT ethical hacking tool designed to scrape and extract emails, phone numbers, and social media links or other URLs from …☆57Updated this week
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆23Updated 3 years ago
- A tool for WI-FI penetration testing that automates your attacking processes.☆29Updated 6 months ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆103Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 5 months ago
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆176Updated 4 months ago
- A blue-team tool, creates a list of USB-Rubber-Ducky instructions.☆46Updated 5 years ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆105Updated 2 weeks ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻☆18Updated 5 years ago
- Xfinity / Comcast Wordlist Generator☆59Updated last year
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 4 years ago
- Check the README file below to see how amazing this is!☆142Updated this week
- Bad USB scripts created for Penetration Testers☆19Updated 2 months ago
- An OSINT Framework project based on Python☆105Updated 8 months ago
- ClatsCracker is a versatile Python password-cracking tool supporting over 15 hash algorithms. It offers dictionary or brute-force attacks…☆43Updated 2 weeks ago
- ☆48Updated last year
- Automated solution for nmap'ing☆27Updated last year
- CyberPunkOS is a virtual machine that incorporates several tools for Open Source Intelligence (OSINT) to dismantle Fake News☆134Updated last year
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆49Updated last week
- Exploits USB HID to steal passwords saved in Google Chrome☆68Updated 7 years ago