arismelachroinos / lscript
The LAZY script will make your life easier, and of course faster.
☆4,176Updated 3 years ago
Alternatives and similar repositories for lscript:
Users that are interested in lscript are comparing it to the libraries listed below
- Efficient and advanced man in the middle framework☆2,098Updated 2 years ago
- Powerful framework for rogue access point attack.☆2,143Updated last year
- Phishing Tool & Information Collector☆4,320Updated 5 months ago
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,256Updated 8 months ago
- Striker is an offensive information and vulnerability scanner.☆2,271Updated last year
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,016Updated 7 months ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆9,940Updated last year
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,121Updated 5 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,192Updated 7 years ago
- Python Remote Administration Tool (RAT)☆3,286Updated last year
- Tools for Pentesting☆2,034Updated last year
- Automatically brute force all services running on a target.☆2,066Updated 8 months ago
- This is a multi-use bash script for Linux systems to audit wireless networks.☆6,882Updated last week
- Websploit is a high level MITM framework☆1,186Updated last year
- Automated Mass Exploiter☆5,109Updated last year
- Rewrite of the popular wireless network auditor, "wifite"☆6,833Updated 8 months ago
- Phishing Campaign Toolkit☆2,383Updated 8 months ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,669Updated last year
- Th3Inspector 🕵️ Best Tool For Information Gathering 🔎☆2,346Updated this week
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,298Updated 7 months ago
- Advanced dork Search & Mass Exploit Scanner☆1,462Updated 8 months ago
- Automatically install all Kali linux tools☆4,939Updated 11 months ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,086Updated last year
- Transparent proxy through Tor for Kali Linux OS☆1,116Updated last year
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,606Updated this week
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆2,250Updated last year
- Official Black Hat Arsenal Security Tools Repository☆4,045Updated 8 months ago
- Generate Gmail Emailing Keyloggers to Windows.☆1,054Updated 2 years ago
- ☆989Updated 2 years ago
- Attack Surface Management Platform☆8,679Updated last month