derrumbe / RuseLinks
Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial recognition systems.
β34Updated 2 years ago
Alternatives and similar repositories for Ruse
Users that are interested in Ruse are comparing it to the libraries listed below
Sorting:
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ34Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.β63Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and Aβ¦β19Updated last year
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).β53Updated last month
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.β21Updated 3 years ago
- Custom pentesting toolsβ25Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.β23Updated 3 years ago
- Free Advance encryptor for Anon Cloudβ16Updated 2 years ago
- Super organized and flexible script for sending phishing campaignsβ55Updated 3 years ago
- Central IoC scanner based on Lokiβ20Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicatedβ¦β24Updated 3 years ago
- Create visualization from Shodan queryβ73Updated 4 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windowsβ15Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writteβ¦β29Updated 3 years ago
- Run search-that-hash from Google colab with fast offline (hashcat) modeβ35Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.β120Updated 11 months ago
- A golang tool that uses the dehashed.com API to search for compromised assets.β9Updated 4 years ago
- β52Updated 4 years ago
- β70Updated 2 years ago
- Keeps track of what repos needs to be saved from the new Github " Exploits and malware policy"β23Updated 4 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.β77Updated 3 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "reaβ¦β21Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of β¦β75Updated 7 months ago
- Image Payload Creating/Injecting toolsβ13Updated 4 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variabβ¦β17Updated 3 years ago
- Small python script wrapper for automating hashcat commandsβ38Updated 4 years ago
- OWASP Foundation Web Respositoryβ36Updated 3 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.β38Updated 2 years ago
- Enumerate a target Based off of Nmap Resultsβ78Updated last year
- β36Updated 3 years ago