cosmic-zip / witchcraft
WITCHCRAFT is a cyberdeck toolkit built for runners who dive deep into the mesh. It’s your all-in-one rig for data-ghosting, ICE-breaking, and corp-system infiltration. Whether you’re running forensic traces, scraping OSINT feeds, or slicing through firewalls, WITCHCRAFT’s got your back.
☆36Updated last month
Alternatives and similar repositories for witchcraft
Users that are interested in witchcraft are comparing it to the libraries listed below
Sorting:
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆120Updated 2 years ago
- Automated rogue access point setup tool.☆196Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 10 months ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 2 years ago
- Full Valid Fake Data Generator☆99Updated 7 months ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆95Updated 3 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆66Updated 2 years ago
- Perform automated network reconnaissance scans☆229Updated 2 years ago
- Complete Automated pentest framework for Servers and Web Application Security☆35Updated 5 years ago
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆205Updated 9 months ago
- A WLAN red team framework.☆153Updated 7 months ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆89Updated last year
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆295Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆110Updated 4 years ago
- TorghostNG - Make all your internet traffic anonymized with Tor network. Rewritten from TorGhost with Python 3☆54Updated 5 years ago
- [ Automated Web Vulnerability Scanner ]☆69Updated 4 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Airodump-ng WiFi Scan Visualizer☆59Updated 7 years ago
- An Encrypted File transfer via AES-256-CBC☆49Updated 4 years ago
- [EN] BETA: Layla - recon tool for bug bounty☆76Updated 3 years ago
- Username enumeration & reconnaisance suite☆173Updated 2 years ago
- D3Ext's Forward Shell☆120Updated last year
- Assist reverse tcp shells in post-exploration tasks☆219Updated last year
- Automate Metasploit scanning and exploitation☆115Updated 7 months ago
- ☆69Updated 2 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- Yet another content discovery tool☆119Updated 6 months ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆107Updated 5 months ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆128Updated 4 years ago