Tsujimar / tsuki-sploit
A USB-based script for Ethical hacking with multiple attacks
☆49Updated last year
Alternatives and similar repositories for tsuki-sploit:
Users that are interested in tsuki-sploit are comparing it to the libraries listed below
- Automate installation of extra pentest tools on Kali Linux☆54Updated 4 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆102Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆45Updated 4 years ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻☆18Updated 5 years ago
- Stuff about it-security that might be good to know☆21Updated 5 years ago
- ClatsCracker is a versatile Python password-cracking tool supporting 25 hash algorithms. It offers dictionary or brute-force attacks, adj…☆50Updated 2 weeks ago
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆77Updated 8 months ago
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆42Updated 2 weeks ago
- [RELEASED] A CLI tool for large-scale password recovery operations using AWS☆29Updated last year
- capNcook - a dark web exploration tool☆67Updated last year
- Enhance your hacking toolkit with my Chrome Extension. Designed for ethical hacking and red team activities, it offers tailored features …☆31Updated 2 weeks ago
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆57Updated 10 months ago
- Information Gathering tool for a Website or IP address☆46Updated last year
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆22Updated 4 years ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 7 months ago
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆179Updated 2 weeks ago
- High quality and text versions of cheat sheets from Cyber Detective Twitter☆22Updated 11 months ago
- Spectrum Router Default Password Wordlist☆69Updated 10 months ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆108Updated 2 years ago
- Browser streaming MITM proxy☆62Updated last year
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆70Updated last year
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆23Updated 5 months ago
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆20Updated 2 years ago
- A tool for WI-FI penetration testing that automates your attacking processes.☆29Updated last month
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 4 years ago
- Incident Response (IR) tool to create a list of USB-Rubber-Ducky instructions.☆50Updated 5 years ago
- Installs parrotOS repository and commonly used tools from parrotOS in ubuntu/debian☆52Updated 3 years ago
- IoT Camera Reconnaissance and Live Viewer☆140Updated 8 months ago
- ☆25Updated 2 weeks ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆42Updated last year