Tsujimar / tsuki-sploitLinks
A USB-based script for Ethical hacking with multiple attacks
☆48Updated 2 years ago
Alternatives and similar repositories for tsuki-sploit
Users that are interested in tsuki-sploit are comparing it to the libraries listed below
Sorting:
- Learn how to set up a fake authentication web page on a fake WiFi network.☆113Updated 2 years ago
- A tool for WI-FI penetration testing that automates your attacking processes.☆37Updated 5 months ago
- Incident Response (IR) tool to create a list of USB-Rubber-Ducky instructions.☆52Updated 6 years ago
- Pentesting Suite☆35Updated last month
- capNcook - a dark web exploration tool☆73Updated last year
- ClatsCracker is a versatile Executable & Python based password-cracking tool supporting 25 hash algorithms. It offers dictionary or brute…☆55Updated 2 months ago
- WiFi Cha0s t00lkit xox☆52Updated last month
- Automate installation of extra pentest tools on Kali Linux☆55Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆51Updated 4 years ago
- Exploits USB HID to steal passwords saved in Google Chrome☆68Updated 7 years ago
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆193Updated 2 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆219Updated 2 years ago
- Project to implement and automate juice jacking: the stealing of phone data through USB connections☆99Updated 8 years ago
- Dracula OS is a Linux operating system meticulously designed for OSINT (Open Source Intelligence) and Cyber Intelligence missions.☆68Updated 4 months ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆104Updated 2 years ago
- Guide can be found at: www.ded-sec.space☆222Updated this week
- A USB phishing evaluation platform☆45Updated 9 years ago
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆91Updated last year
- Enhance your hacking toolkit with my Chrome Extension. Designed for ethical hacking and red team activities, it offers tailored features …☆42Updated 4 months ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆105Updated last year
- Information Gathering tool for a Website or IP address☆54Updated last year
- Torrent files for data breaches used in research☆144Updated 3 years ago
- Stuff about it-security that might be good to know☆22Updated 5 years ago
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆174Updated last year
- Searching the TrashPanda OSINT bot API to check if your email/domain or password was leaked or not☆64Updated 4 years ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆95Updated 2 years ago
- WiFi Rubber Ducky with a web interface using CircuitPython☆99Updated 2 months ago
- Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Resea…☆120Updated 3 years ago
- This script allows you to take control of a PC with a reverseShell attack.☆53Updated 3 years ago
- Browser streaming MITM proxy☆68Updated last year