It is all in One Pentesting tool . It Has modules , Information Gathering exploitation + vulnerability scanning , proxy scraper and wordpress vulnerability scanning and more
☆19Apr 6, 2025Updated 11 months ago
Alternatives and similar repositories for d4rk_ghost
Users that are interested in d4rk_ghost are comparing it to the libraries listed below
Sorting:
- ☆15Nov 11, 2021Updated 4 years ago
- A Directory Bruteforcing Tool That Makes Your Life Easier!☆17Aug 29, 2023Updated 2 years ago
- BitraCoin - Bitranium Teknoloji A.S☆12Apr 21, 2022Updated 3 years ago
- A simple Commandline Program Developed Using Python3 to make GNU Privacy Guard Program easy to use for beginners.☆10Updated this week
- All in One Hacking Tool for Linux & Android☆33Apr 24, 2018Updated 7 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Mar 9, 2023Updated 3 years ago
- ☆15May 22, 2022Updated 3 years ago
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 API☆42May 17, 2024Updated last year
- Neural network that can generate meme captions, built upon GPT-2☆13May 21, 2021Updated 4 years ago
- ✓ Using scapy and nmap tools, find out ip/port, ARP SPOOFING & TCP SESSION HIJACKING ✓ Using snort tool provided Intrusion Detection Syst…☆10Oct 29, 2019Updated 6 years ago
- This Repo is under constant update. We will update all the notes while preparing for OSCP. If anyone want to contribute you are most welc…☆11Aug 29, 2019Updated 6 years ago
- Moonton Dump + Checker Email Password☆20Jul 18, 2021Updated 4 years ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- A small console util to create time sheet reports for a department.☆10Aug 19, 2022Updated 3 years ago
- PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.☆10Oct 1, 2025Updated 5 months ago
- Repo containing all info, scripts, etc. related to CVE-2021-44228☆10Dec 29, 2021Updated 4 years ago
- Some improvements on a Binance.net main repo for specific tasks. Merged to the main brunch☆12Sep 11, 2024Updated last year
- CVE-2021-4034 POC and Docker and Analysis write up☆12May 23, 2022Updated 3 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- Lockstitch is an incremental, stateful cryptographic primitive for symmetric-key cryptographic operations (e.g. hashing, encryption, mess…☆12Feb 5, 2026Updated last month
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Aug 30, 2021Updated 4 years ago
- JavaAgent内存马实现、检测、修复demo☆11Dec 7, 2022Updated 3 years ago
- ☆14Jan 29, 2022Updated 4 years ago
- script = ye☆15Aug 2, 2023Updated 2 years ago
- Resilient, Stealthy & Capable Windows Backdoor. Utilizing Telegram for command relays☆13Feb 12, 2023Updated 3 years ago
- Joulecoin☆13Sep 4, 2020Updated 5 years ago
- Dump Microsoft Portable Executable (PE) Files Information☆15Dec 13, 2025Updated 2 months ago
- Intercom with answering machine / Домофон с автоответчиком☆15Feb 20, 2024Updated 2 years ago
- hacking-tutorials hacking-tutorials A Hacking tutorial collection. Most stuff is outdated. ONLY for educational purposes.☆12Jul 16, 2023Updated 2 years ago
- shiro反序列化利用综合利用,包含(回显执行命令/注入内存马)原版中NoCC的问题 https://github.com/j1anFen/shiro_attack☆12May 1, 2022Updated 3 years ago
- Scanner to send specially crafted requests and catch callbacks of systems that are impacted by log4j log4shell vulnerability and to detec…☆12Feb 15, 2022Updated 4 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- 移动端渗透测试☆13Aug 7, 2022Updated 3 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆14Aug 15, 2022Updated 3 years ago
- 从零开始的内网渗透学习记录☆12Mar 25, 2022Updated 3 years ago
- CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合☆10Jul 30, 2022Updated 3 years ago
- PowerShell script that gathers data about logons and logoffs from Event Logs.☆12Aug 2, 2013Updated 12 years ago