capture0x / EvilEyes-Extract
☆28Updated last year
Related projects: ⓘ
- Check out this JavaScript code that extracts URLs from a web page and linked scripts! Perfect for web scraping and penetration testing☆16Updated 2 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆46Updated 6 months ago
- Algunos #OSINT_TIPS para sus excelentes investigaciones en fuentes abiertas (#OSINT). Hello! I share some #OSINT_TIPS for your excellent …☆24Updated 7 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆55Updated 5 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated 10 months ago
- A comprehensive automation script for penetration testing and reconnaissance.☆25Updated last month
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆60Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆69Updated 2 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆49Updated 3 years ago
- Collection of my talks and workshops about hacking & cybersecurity☆24Updated 2 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆25Updated 7 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆67Updated last year
- ProxyChecker Made in NodeJS☆36Updated 2 years ago
- An OSINT focused tool made with Nodejs!☆84Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆46Updated 3 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆24Updated 11 months ago
- Tool for automate bug hunting process 🔍 --> 🍭☆32Updated last month
- Hacking with PasteJacking technique☆18Updated 2 months ago
- Python RAT that uses Telegram as C2 endpoint☆25Updated last year
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆59Updated 6 months ago
- ☆29Updated this week
- Garudaastra Tool is based on python3 to find cameras around the world☆28Updated last year
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆91Updated 9 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆62Updated last week
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆98Updated last month
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated last year
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆48Updated 4 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- Red Teaming tools and techniques☆45Updated last year
- Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured sys…☆34Updated 2 months ago