derrumbe / RuseLinks
Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial recognition systems.
β34Updated 2 years ago
Alternatives and similar repositories for Ruse
Users that are interested in Ruse are comparing it to the libraries listed below
Sorting:
- A golang tool that uses the dehashed.com API to search for compromised assets.β9Updated 4 years ago
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ34Updated 3 years ago
- Create visualization from Shodan queryβ73Updated 4 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.β21Updated 3 years ago
- Bare Bones Banking malware coded for research & educational purposesβ89Updated 4 years ago
- Free Advance encryptor for Anon Cloudβ16Updated 2 years ago
- β52Updated 4 years ago
- Small python script to look for common vulnerabilities on SMTP server.β47Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windowsβ15Updated 3 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variabβ¦β17Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and Aβ¦β19Updated last year
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]β54Updated 3 years ago
- β70Updated 2 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.β120Updated 11 months ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "reaβ¦β21Updated last year
- Post-exploitation toolβ26Updated 4 years ago
- Keeps track of what repos needs to be saved from the new Github " Exploits and malware policy"β22Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of β¦β75Updated 6 months ago
- Central IoC scanner based on Lokiβ20Updated 3 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.β23Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.β62Updated 2 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standβ¦β90Updated last year
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.β60Updated 3 years ago
- Modular framework to exploit UPS devicesβ63Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.β27Updated 3 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial β¦β14Updated 3 years ago
- β17Updated 5 years ago
- β24Updated 5 years ago
- Windows Keylogger in C++β19Updated 2 years ago
- Custom pentesting toolsβ25Updated 4 years ago