Web Browser Hooking Framework. Manage, execute and assess web browser vulnerabilities
☆40Aug 2, 2018Updated 7 years ago
Alternatives and similar repositories for whoof
Users that are interested in whoof are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Additional resources and references for linux-exploit-suggester.sh☆30Oct 2, 2020Updated 5 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49May 16, 2017Updated 8 years ago
- ☆10Oct 25, 2017Updated 8 years ago
- ☆11Dec 7, 2025Updated 4 months ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- oneliner is a tool that gives a list of compatible reverse-shell-string oneliners☆24Jul 30, 2016Updated 9 years ago
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- ☆13Aug 11, 2018Updated 7 years ago
- Universal MITM web server☆106May 4, 2017Updated 9 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Oct 11, 2017Updated 8 years ago
- A collection of Cobalt Strike aggressor scripts☆17Jul 7, 2020Updated 5 years ago
- Repository of tools used in my blog☆52Mar 22, 2024Updated 2 years ago
- Collection of scanner checks missing in Burp☆31Jun 15, 2020Updated 5 years ago
- ParrotSec Raspberry PI armhf image builder.☆19Jul 26, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆39Aug 8, 2021Updated 4 years ago
- laravel 5.8 rce pop chain☆26Oct 27, 2019Updated 6 years ago
- ☆14Dec 22, 2020Updated 5 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Jan 13, 2023Updated 3 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- ☆14May 14, 2018Updated 7 years ago
- Python EMV Utilities using Jean-Daniel Aussel's PySCard Library☆21Feb 15, 2019Updated 7 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Jan 6, 2019Updated 7 years ago
- Deploy payloads to *Nix systems en masse☆108Apr 24, 2020Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆25Dec 14, 2016Updated 9 years ago
- Android Google Map 2 Project to find friend location with live movement.☆10Feb 9, 2015Updated 11 years ago
- Open source image editor for windows 10. Can be controlled by voice commands and Cortana.☆17Nov 14, 2017Updated 8 years ago
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- ☆38Jan 7, 2025Updated last year
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- ☆11Jul 15, 2024Updated last year
- D-RAT SRC Extract☆13Dec 24, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- General tools and scripts i want to make public to the world.☆47Apr 14, 2019Updated 7 years ago
- Drivers for interfacing HackRF radios with REDHAWK☆11Jun 18, 2020Updated 5 years ago
- Burp Suite plugin identifies insertion points for GWT (Google Web Toolkit) requests☆13Sep 24, 2015Updated 10 years ago
- BadProxy is the tool which show a man in middle attack over the internet over the proxy☆10Mar 31, 2018Updated 8 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- ☆66Jan 12, 2022Updated 4 years ago