davideolgiati / PartyLoudView external linksLinks
A simple tool to generate fake web browsing and mitigate tracking
☆286Nov 26, 2024Updated last year
Alternatives and similar repositories for PartyLoud
Users that are interested in PartyLoud are comparing it to the libraries listed below
Sorting:
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 6 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Bash script for CTF automating basic enumeration☆42Mar 1, 2022Updated 3 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆68Mar 4, 2023Updated 2 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 4 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- best tool for hacking via windows cmd☆13Jan 4, 2019Updated 7 years ago
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆240Jul 3, 2024Updated last year
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆823Nov 15, 2025Updated 3 months ago
- Powershell script to exfiltrate large files quickly and securely☆125May 4, 2022Updated 3 years ago
- A python script which allows you to parse GeoLocation data from your Image files stored in a dataset.It also produces output in CSV file …☆41Dec 20, 2020Updated 5 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 6 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Jul 20, 2022Updated 3 years ago
- Command and Control Framework☆13Mar 23, 2024Updated last year
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- Wipe, reinstall or restore your system from running GNU/Linux distribution. Via SSH, without rebooting.☆281Nov 19, 2024Updated last year
- A fast http and https prober, to check which URLs are alive☆69Aug 5, 2019Updated 6 years ago
- Automatic reverse/bind shell generator cheat sheet.☆34Jan 9, 2023Updated 3 years ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆141Jun 26, 2019Updated 6 years ago
- A medium interaction printer honeypot 🍯☆203Jul 9, 2023Updated 2 years ago
- Scripts to execute enumeration via LFI☆91Apr 8, 2019Updated 6 years ago
- misc scripts/utils that I've written that aren't deserving of own repos.☆14Aug 18, 2021Updated 4 years ago
- Powerful advanced web platform for C2 managing and automated penetration testing.☆15Jun 30, 2023Updated 2 years ago
- A productivity burp extension which reminds to take break while you are at work!☆18May 31, 2020Updated 5 years ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆137Jun 6, 2019Updated 6 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- Zone transfers for rwhois☆20Feb 27, 2019Updated 6 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆678Oct 28, 2023Updated 2 years ago
- Burp Suite extension to help make Graphql request more readable☆33Dec 7, 2017Updated 8 years ago
- internet monitoring osint telegram bot for windows☆154Apr 9, 2023Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- ☆19Jun 26, 2017Updated 8 years ago