Tuhinshubhra / RED_HAWKLinks
All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers
β3,470Updated last year
Alternatives and similar repositories for RED_HAWK
Users that are interested in RED_HAWK are comparing it to the libraries listed below
Sorting:
- Th3Inspector π΅οΈ Best Tool For Information Gathering πβ2,544Updated 7 months ago
- Automatically brute force all services running on a target.β2,169Updated last year
- X Attacker Tool β£ Website Vulnerability Scanner & Auto Exploiterβ1,700Updated 2 years ago
- Reconnaissance Swiss Army Knifeβ1,979Updated 4 years ago
- Efficient and advanced man in the middle frameworkβ2,149Updated 2 years ago
- Tools for Pentestingβ2,110Updated 2 years ago
- Advanced dork Search & Mass Exploit Scannerβ1,521Updated last year
- Generate unicode domains for IDN Homograph Attack and detect them.β1,230Updated 3 years ago
- Phishing Tool & Information Collectorβ4,588Updated last year
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on βLoginβ¦β1,493Updated 4 months ago
- ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exβ¦β1,063Updated 6 years ago
- Websploit is a high level MITM frameworkβ1,217Updated 2 years ago
- π Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.β2,516Updated 2 years ago
- A port of ParrotSec's stealth and anonsurf modules to Kali Linuxβ1,788Updated 9 months ago
- Find exploits in local and online databases instantlyβ1,783Updated 4 years ago
- The LAZY script will make your life easier, and of course faster.β4,278Updated 4 years ago
- SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghiβ1,859Updated 2 years ago
- Phishing Campaign Toolkitβ2,489Updated 4 months ago
- Crack hashes in seconds.β1,846Updated last year
- Generate Gmail Emailing Keyloggers to Windows.β1,117Updated 3 years ago
- β1,047Updated 2 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be usβ¦β762Updated 5 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy β¦β1,217Updated 5 years ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoorβ2,407Updated last year
- Tool Information Gathering Write By Python.β741Updated 2 years ago
- An advanced multithreaded admin panel finder written in python.β828Updated last year
- The Multi-Tool Web Vulnerability Scanner.β1,957Updated 2 years ago
- A Penetration Testing Framework, Information gathering tool & Website Vulnerability Scannerβ733Updated 2 weeks ago
- Striker is an offensive information and vulnerability scanner.β2,317Updated 2 years ago
- Information gathering tool - OSINTβ1,359Updated 4 years ago