dcodeni / cloudAttackLinks
☆12Updated 6 years ago
Alternatives and similar repositories for cloudAttack
Users that are interested in cloudAttack are comparing it to the libraries listed below
Sorting:
- Contact Telegram : https://t.me/hakanonymos☆53Updated last year
- Bramble is a hacking Open source suite.☆85Updated 5 years ago
- Simple Backdoor Manager with Python (based on weevely)☆95Updated 7 months ago
- This program provides efficient web scraping services for Tor and non-Tor sites. The program has both a CLI and REST API.☆168Updated 5 months ago
- System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts☆150Updated 3 years ago
- Script to facilitate different functions and checks☆47Updated 3 years ago
- WP Grab Info v2☆67Updated 7 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆62Updated 3 months ago
- Gmail phishing page sample☆68Updated 4 years ago
- An advanced reverse shell written in Python3.☆22Updated 4 years ago
- A repository of Tor hidden services.☆65Updated 3 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆78Updated 2 years ago
- Scan the entire internet for SSH and Telnet services. Then hack them.☆81Updated 3 years ago
- Chrome extension designed for WordPress Vulnerability Scanning and information gathering!☆112Updated 2 years ago
- An Android spyware which interacts with a remote C&C server to exfiltrate phone data☆75Updated 5 years ago
- Web App Pen Tester (Web Interface)☆32Updated 2 years ago
- Simple PHP - Javascript - Webserver Cookie Stealer Script for XSS☆58Updated 7 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆184Updated 5 years ago
- Python API wrapper for DarkSearch (darksearch.io).☆34Updated 3 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 2 months ago
- An0n 3xPloiTeR Shell☆35Updated 5 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Updated 7 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆77Updated 7 years ago
- Perform automated network reconnaissance scans☆234Updated 2 years ago
- A Simple Go program for Windows that will recover Google Chrome Logins☆77Updated 4 years ago
- Hacking, pen-testing, and cyber-security related tools built with Python.☆35Updated 4 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆122Updated last year
- A javascript based botnet/C&C to remotely manage/control browsers.☆23Updated 3 years ago
- Custom security distro for remote penetration testing☆55Updated 4 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆33Updated 8 years ago