The New Hacking Framework
☆18Apr 26, 2017Updated 8 years ago
Alternatives and similar repositories for KatanaFramework
Users that are interested in KatanaFramework are comparing it to the libraries listed below
Sorting:
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆28Jul 11, 2019Updated 6 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Nov 10, 2019Updated 6 years ago
- Tool for dictionary attack with fail2ban bypass.☆10May 17, 2018Updated 7 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Aug 14, 2019Updated 6 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆15Dec 10, 2019Updated 6 years ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- A tool to abuse Exchange services☆18Jun 21, 2019Updated 6 years ago
- PowerShell Pass The Hash Utils☆16Dec 9, 2018Updated 7 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆31Nov 8, 2018Updated 7 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆28Mar 2, 2019Updated 7 years ago
- A scraping and aggregating package using the CollegeFootballData API☆11Dec 11, 2020Updated 5 years ago
- Impacket is a collection of Python classes for working with network protocols.☆38Oct 13, 2021Updated 4 years ago
- Automated Penetration Testing Framework☆35Mar 22, 2019Updated 6 years ago
- Pythonic world - Python 3.x☆37Feb 18, 2020Updated 6 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- The Wave theme for OXID eShop☆10Aug 7, 2023Updated 2 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Sep 5, 2018Updated 7 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- Unofficial mirror of GNUK's submodule: Chopstx☆12Aug 15, 2020Updated 5 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- create buckets for terraform tfstate files and set cross-region replication.☆12Sep 17, 2017Updated 8 years ago
- ChessDragon136's Unoficcial MediaBrowser 3 client for Samsung TV's☆10Dec 24, 2015Updated 10 years ago
- Python scripts to exploit CVE-2014-9016 and CVE-2014-9034☆13Dec 27, 2014Updated 11 years ago
- Projekt dokumentu został przygotowany przez osoby zrzeszone w stowarzyszeniach ISSA Polska oraz IIA Polska. Jego celem jest wskazanie pro…☆11Jun 22, 2021Updated 4 years ago
- how-to-write-a-node-cli-tools-with-commander☆14Nov 22, 2014Updated 11 years ago
- Estimate how long it takes to read a text☆12Sep 6, 2025Updated 5 months ago
- نمونه سوالات و پاسخ های مصاحبه تست نفوذ برنامه های موبایل☆15Aug 21, 2023Updated 2 years ago
- Reverse engineering the Github websocket API - alive.github.com☆14Apr 19, 2023Updated 2 years ago
- Automatic cloud backup of Kali Linux data☆12Feb 27, 2020Updated 6 years ago
- An example / test case of importing typescript modules located in a node_modules folder.☆10Nov 4, 2015Updated 10 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- This repository contains supplemental materials for the IEEE InfoVis 2018 submission "Hypothetical Outcome Plots Help Untrained Observers…☆14Oct 29, 2018Updated 7 years ago
- Scripts and Tips for Kali Linux Pi-Tail Edition☆11Dec 8, 2023Updated 2 years ago
- Terminate/Delete resources in your AWS account to get a clean slate.☆11Nov 6, 2014Updated 11 years ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆17Nov 18, 2025Updated 3 months ago
- ☆12Aug 5, 2021Updated 4 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆10Feb 13, 2017Updated 9 years ago