dedsecurity / dedsecurity-framework
Ded Security Framework is a tool aimed at security professionals
☆35Updated 11 months ago
Alternatives and similar repositories for dedsecurity-framework:
Users that are interested in dedsecurity-framework are comparing it to the libraries listed below
- Hacking with PasteJacking technique☆22Updated 9 months ago
- Dogma V1.5.3☆28Updated 5 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Hax is a mini-tool with really useful hacking tools.☆18Updated last year
- ☆12Updated last year
- An OSINT tool to search for accounts by username in social networks.☆17Updated 2 years ago
- DASH is deep osint Scanner. You just need username to start osint scan.☆48Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- Cracking protocols FTP and SSH.☆11Updated 8 months ago
- Who We Are☆19Updated 7 months ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆23Updated 3 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 4 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated last year
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆39Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- ☆19Updated 6 years ago
- ☆27Updated 2 years ago
- want to remove sensitive data from photos or even view it? use autoexif to easily help you do that no more remembering syntaxs with this …☆37Updated this week
- FrameDomain Framework - subdomains enumeration tool for penetration testers☆31Updated 4 years ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆21Updated last year
- ☆14Updated 3 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆39Updated 2 years ago
- A Simple Script For SSH BruteForce☆36Updated last year
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆40Updated 2 years ago
- List of OSINT resources☆15Updated 4 years ago
- Clipboard poisoning attack.☆56Updated 4 years ago
- VLAN attacks toolkit☆14Updated 2 years ago
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆20Updated last year