dx7er / CreepLinks
Python Toolkit containing different Cyber Attacks Tools
☆27Updated last year
Alternatives and similar repositories for Creep
Users that are interested in Creep are comparing it to the libraries listed below
Sorting:
- Web-See is Tool For Checkout Status Of Urls in Mass Its For Bug Bounty Hunters And Black Hat Hackers It Will Save Your Valuable Time Scr…☆15Updated 3 years ago
- Search Google Dorks like Chad. / Broken link hijacking tool.☆30Updated last week
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- A fast and powerful http toolkit that take a list of domains to find active domains and other information such as status-code, title, res…☆80Updated 2 years ago
- web application pentesting tools for docker☆18Updated 3 years ago
- Extendable Python script handler for automating penetration testing.☆40Updated 2 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆120Updated last year
- Perform OSINT on external targets using Shodan☆22Updated last year
- Collection of offensive tools targeting Microsoft Azure☆11Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated 3 weeks ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- A Simple Script For SSH BruteForce☆37Updated 2 years ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆34Updated 7 months ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆20Updated 3 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆23Updated 2 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Perform With Mass Exploiter In Joomla 4.2.8.☆34Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Clipboard poisoning attack.☆59Updated 5 years ago
- python keylogger and spying malware .☆13Updated 5 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 4 years ago
- proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, …☆32Updated 2 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆27Updated 3 years ago
- Hacking with PasteJacking technique☆22Updated last year
- Boost website hits by generating requests from multiple proxy IPs.☆74Updated last year
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Updated 8 months ago
- A wacky exploitation framework written in pure python3.☆24Updated last year