Veil 3.1.X (Check version info in Veil at runtime)
β16Aug 14, 2019Updated 6 years ago
Alternatives and similar repositories for Veil
Users that are interested in Veil are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Universal Radio Hacker: investigate wireless protocols like a boss π‘πβ17Nov 10, 2019Updated 6 years ago
- β12Dec 10, 2020Updated 5 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pinoβ15Dec 10, 2019Updated 6 years ago
- LinkedIn reconnaissance toolβ11Dec 29, 2019Updated 6 years ago
- A library that scrapes Linkedin for user dataβ25May 12, 2021Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available β’ AdRun AI, ML, and HPC workloads on powerful cloud GPUsβwithout limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the rβ¦β11Jun 14, 2019Updated 6 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.β49Jul 30, 2019Updated 6 years ago
- Web-based shell written in PHPβ12Aug 27, 2018Updated 7 years ago
- Comfy & powerful Red Team Infrastructure deployement using Dockerβ13Oct 29, 2019Updated 6 years ago
- Collect XSS vulnerable parameters from entire domain.β13Jul 29, 2022Updated 3 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.β11Apr 2, 2022Updated 4 years ago
- PowerShell Pass The Hash Utilsβ16Dec 9, 2018Updated 7 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSsβ30Jun 13, 2019Updated 6 years ago
- The New Hacking Frameworkβ18Apr 26, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. Theβ¦β11Dec 8, 2021Updated 4 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searchingβ12Jun 4, 2022Updated 3 years ago
- A tool to abuse Exchange servicesβ18Jun 21, 2019Updated 6 years ago
- A tool for generating reverse shell payloads on the fly.β10Jun 18, 2022Updated 3 years ago
- a drop-in replacement for Nmap powered by shodan.ioβ10Apr 5, 2022Updated 4 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.β13Jan 6, 2022Updated 4 years ago
- Collection of offensive tools targeting Microsoft Azureβ10Jun 9, 2022Updated 3 years ago
- A Tool for Domain Flyoversβ18Nov 12, 2019Updated 6 years ago
- decompiled pegasus_spywareβ14Jul 31, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.β12Aug 6, 2019Updated 6 years ago
- Bluetooth reverse shell.β14Dec 16, 2020Updated 5 years ago
- Automated Penetration Testing Frameworkβ35Mar 22, 2019Updated 7 years ago
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript filesβ10Mar 29, 2021Updated 5 years ago
- This tool scans for a number of common, vulnerable components (openssl, libpng, libxml2, expat and a few others) to let you know if your β¦β16Mar 24, 2021Updated 5 years ago
- β12Dec 14, 2016Updated 9 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2β60May 16, 2021Updated 5 years ago
- A toolkit to attack Office365β16Aug 1, 2019Updated 6 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatioβ¦β11Jul 22, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Extract credentials from lsass remotelyβ16Jan 3, 2020Updated 6 years ago
- Nmap custom probes for better detecting SAP servicesβ144Mar 8, 2024Updated 2 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.β17Oct 10, 2016Updated 9 years ago
- Merge & query nmap and nessus reports via SQL directly in your browser!β20Jan 18, 2022Updated 4 years ago
- Several script and images used with the juice jacking kiosksβ12Jul 21, 2013Updated 12 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on itβ14Feb 18, 2021Updated 5 years ago
- Use DNS to hunt for threats including DGAsβ15Jan 4, 2016Updated 10 years ago