caster0x00 / InterceptLinks
MITM Field Manual
☆368Updated 3 weeks ago
Alternatives and similar repositories for Intercept
Users that are interested in Intercept are comparing it to the libraries listed below
Sorting:
- ☆136Updated 4 years ago
- This repository contain a CheatSheet for OSWP & WiFi Cracking.☆337Updated 3 years ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆275Updated last year
- ☆106Updated 2 years ago
- Modern web-based distributed hashcracking solution, built on hashcat☆191Updated this week
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆219Updated 10 months ago
- ☆317Updated last year
- Friendly graphical output of the nmap tool that allows filtering by open ports☆185Updated 3 years ago
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆180Updated last week
- ☆124Updated last year
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆41Updated last year
- Shodan Dorks☆483Updated 11 months ago
- ☆567Updated last year
- Search & Parse Password Leaks☆415Updated last year
- Network Security Sniffer☆838Updated last month
- ☆351Updated 2 years ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆105Updated last year
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆29Updated 2 months ago
- Shodan Dorks 2023☆244Updated last year
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆278Updated 3 months ago
- Light-weight web security scanner☆150Updated 2 months ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆106Updated 3 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆378Updated 2 years ago
- OSINT tool to crawl a site and extract useful recon info.☆453Updated 5 months ago
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆333Updated 4 months ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆334Updated 2 years ago
- Network Forensics CLI utility that performs Network Scanning, OSINT, and Attack Detection☆284Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆506Updated 5 months ago
- A good selection of Privacy & Infosec tools that will help you understand more about how to protect your online privacy and security.☆133Updated last month
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆404Updated last month