derrumbe / RuseLinks
Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial recognition systems.
☆34Updated 2 years ago
Alternatives and similar repositories for Ruse
Users that are interested in Ruse are comparing it to the libraries listed below
Sorting:
- A WLAN red team framework.☆154Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆63Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- Create visualization from Shodan query☆75Updated 4 years ago
- Free Advance encryptor for Anon Cloud☆16Updated 2 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- Bash script for CTF automating basic enumeration☆43Updated 3 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated 2 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆78Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆92Updated last month
- Just another vulnerable web application.☆36Updated last year
- Customized Password/Passphrase List inputting Target Info☆95Updated 11 months ago
- Run search-that-hash from Google colab with fast offline (hashcat) mode☆35Updated 4 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆63Updated 4 years ago
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 3 years ago
- ☆19Updated 4 years ago
- Custom pentesting tools☆25Updated 4 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Updated 3 years ago
- Dehashed API CLI☆21Updated 5 years ago
- The DNS Hunt will make your life easier, and of course faster.☆48Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 11 months ago
- Automated rogue access point setup tool.☆199Updated 4 years ago
- A library that scrapes Linkedin for user data☆23Updated 4 years ago
- ☆53Updated 4 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago