Tsujimar / tsuki-sploitLinks
A USB-based script for Ethical hacking with multiple attacks
☆51Updated 2 years ago
Alternatives and similar repositories for tsuki-sploit
Users that are interested in tsuki-sploit are comparing it to the libraries listed below
Sorting:
- Learn how to set up a fake authentication web page on a fake WiFi network.☆111Updated 2 years ago
- Automate installation of extra pentest tools on Kali Linux☆57Updated 4 years ago
- Pentesting Suite☆30Updated 2 weeks ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆218Updated 2 years ago
- ClatsCracker is a versatile Executable & Python based password-cracking tool supporting 25 hash algorithms. It offers dictionary or brute…☆52Updated 3 weeks ago
- Incident Response (IR) tool to create a list of USB-Rubber-Ducky instructions.☆51Updated 6 years ago
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆87Updated 11 months ago
- Project to implement and automate juice jacking: the stealing of phone data through USB connections☆98Updated 8 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆104Updated 2 years ago
- capNcook - a dark web exploration tool☆70Updated last year
- Searching the TrashPanda OSINT bot API to check if your email/domain or password was leaked or not☆64Updated 3 years ago
- Dracula OS is a Linux operating system meticulously designed for OSINT (Open Source Intelligence) and Cyber Intelligence missions.☆67Updated 3 months ago
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆191Updated 2 years ago
- Check the README file below to see how amazing this is! (NO ROOT IS NEEDED!)☆214Updated this week
- Turning smart lights into Wifi Hacking implants.☆125Updated 5 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆51Updated 4 years ago
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆25Updated 3 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆105Updated last year
- An automated phishing tool with templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse…☆104Updated 2 years ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 4 years ago
- Popular OSINT framework for online investigations.☆259Updated 8 months ago
- Torrent files for data breaches used in research☆135Updated 3 years ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻☆21Updated 5 years ago
- Stuff about it-security that might be good to know☆23Updated 5 years ago
- Here are some of the most important cyber security tools.☆43Updated 2 years ago
- Exploits USB HID to steal passwords saved in Google Chrome☆67Updated 7 years ago
- A tool for WI-FI penetration testing that automates your attacking processes.☆32Updated 4 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆95Updated last year
- Bash Script to automate install of AWUS036ACH Wireless Alfa drivers instead of manually running every command. Works on Kali Linux/Debian…☆50Updated 2 months ago
- thelordseye searches and returns detailed information about devices that are directly connected to the internet [IoT] (Smart TV's, Fridge…☆72Updated last year