cosmic-zip / witchcraftLinks
WITCHCRAFT is a cyberdeck toolkit built for runners who dive deep into the mesh. It’s your all-in-one rig for data-ghosting, ICE-breaking, and corp-system infiltration. Whether you’re running forensic traces, scraping OSINT feeds, or slicing through firewalls, WITCHCRAFT’s got your back.
☆40Updated last month
Alternatives and similar repositories for witchcraft
Users that are interested in witchcraft are comparing it to the libraries listed below
Sorting:
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- Perform automated network reconnaissance scans☆234Updated 2 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆97Updated 3 years ago
- A WLAN red team framework.☆157Updated 11 months ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆245Updated last year
- Multi-threaded URL enumeration/content-discovery tool in Python.☆106Updated last year
- [ Automated Web Vulnerability Scanner ]☆73Updated 5 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- Automated rogue access point setup tool.☆196Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- ☆71Updated 2 years ago
- An Encrypted File transfer via AES-256-CBC☆52Updated 4 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆121Updated 3 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆68Updated 2 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆57Updated 2 years ago
- Customized Password/Passphrase List inputting Target Info☆91Updated 10 months ago
- Full Valid Fake Data Generator☆101Updated 11 months ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆91Updated last year
- extensible exploitation framework shipped on a modular multi-tasking architecture☆77Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- Simple Backdoor Manager with Python (based on weevely)☆95Updated 6 months ago
- [EN] BETA: Layla - recon tool for bug bounty☆77Updated 3 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated last month
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Updated 3 years ago
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆210Updated last year
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated 9 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- on-the-fly☆85Updated last year