cosmic-zip / witchcraftLinks
WITCHCRAFT is a cyberdeck toolkit built for runners who dive deep into the mesh. It’s your all-in-one rig for data-ghosting, ICE-breaking, and corp-system infiltration. Whether you’re running forensic traces, scraping OSINT feeds, or slicing through firewalls, WITCHCRAFT’s got your back.
☆36Updated 2 months ago
Alternatives and similar repositories for witchcraft
Users that are interested in witchcraft are comparing it to the libraries listed below
Sorting:
- Perform automated network reconnaissance scans☆230Updated 2 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆95Updated 3 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 11 months ago
- A WLAN red team framework.☆155Updated 8 months ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆121Updated 2 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- XposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of…☆145Updated 5 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 4 years ago
- Arkhota, a web brute forcer for Android.☆20Updated 2 years ago
- Complete Automated pentest framework for Servers and Web Application Security☆35Updated 5 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 2 years ago
- [ Automated Web Vulnerability Scanner ]☆70Updated 4 years ago
- Automated rogue access point setup tool.☆196Updated 4 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆90Updated last year
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆67Updated 2 years ago
- Automate Metasploit scanning and exploitation☆115Updated 8 months ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆128Updated 4 years ago
- Wi-Fi Exploit Tool☆53Updated 5 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆208Updated 5 years ago
- [EN] BETA: Layla - recon tool for bug bounty☆76Updated 3 years ago
- - Crawler on tor network sites, searching for keywords.☆138Updated last year
- Automated Tools Pentest☆7Updated 2 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Updated 5 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆369Updated 2 years ago
- An Encrypted File transfer via AES-256-CBC☆49Updated 4 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆140Updated 6 years ago
- Yet another content discovery tool☆119Updated 6 months ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆66Updated 6 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago