awesome-pentest-gadgets / skyliftLinks
WiFi Geolocation Spoofing with the ESP8266
☆63Updated 7 years ago
Alternatives and similar repositories for skylift
Users that are interested in skylift are comparing it to the libraries listed below
Sorting:
- DEDSEC_WI-FIDAR is a Linux-based Wi-Fi mapping tool designed for network analysis. It scans available Wi-Fi networks in your area and cal…☆174Updated 9 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆207Updated 9 months ago
- Integrate LLM models directly into Ghidra for automated code rewrite and analysis.☆224Updated last month
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆96Updated 4 months ago
- 𝐒𝐞𝐚𝐫𝐜𝐡 𝐏𝐡𝐨𝐧𝐞 is a tool for looking up linked phone number information, which uses the Phone Number Analyzer API from the RAPID…☆204Updated last year
- Darkweb_Crawler - is an advanced, stealthy Python-based dark web intelligence platform designed for authorized security professionals and…☆110Updated last month
- A user-friendly Python toolkit for open source intelligence, providing key features such as image geolocation, social media profiling, em…☆210Updated 4 months ago
- AntiHunter Perimeter Defense Systems☆250Updated last week
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆265Updated 2 weeks ago
- AntiHunter Perimeter Defense Systems☆60Updated this week
- A tool for hacking into publicly exposed network cameras, with support for targeting specific countries and regions, and visualizing the …☆336Updated last week
- Async-powered OSINT and recon toolkit built for speed and precision☆217Updated 4 months ago
- EmailCrawl - is a professional-grade OSINT (Open Source Intelligence) tool designed for advanced email address extraction through compreh…☆120Updated last month
- automated Open Source Intelligence gathering☆180Updated last month
- Advanced analysis software for APK payloads created by RATs.☆32Updated last week
- Creating a Fake WhatsApp Message via SQLite: Understanding the Logic Behind the Manipulation☆35Updated 5 months ago
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆34Updated 11 months ago
- An interactive Bash-based network scanning tool that provides live host discovery, port scanning, traceroute, and ping tests, featuring v…☆63Updated 9 months ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆104Updated 2 months ago
- Lightweight && straight forward command-line tool for searching and downloading exploits from Exploit-DB.☆36Updated last week
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆288Updated 5 months ago
- It’s an OSINT reconnaissance poc powered by Local LLMs (Ollama). You can feed it an email, domain, or IP, and it automatically performs m…☆74Updated 2 months ago
- This is a local search engine to search for cybersecurity tools. It has 3000+ tools in it's database.☆195Updated 3 months ago
- world's first Opensource fully Autonomous AI Security Engineer☆59Updated 2 months ago
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆57Updated 9 months ago
- An astronomical collection of space-related cybersecurity tools 🚀✨☆240Updated last year
- HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network ca…☆322Updated 3 weeks ago
- POC of CVE-2018-9995 written in Rust.☆96Updated 2 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆129Updated 9 months ago
- AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs☆193Updated last month