dx7er / CreepLinks
Python Toolkit containing different Cyber Attacks Tools
☆28Updated last year
Alternatives and similar repositories for Creep
Users that are interested in Creep are comparing it to the libraries listed below
Sorting:
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated last month
- Search Google Dorks like Chad. / Broken link hijacking tool.☆29Updated 3 weeks ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- A fast and powerful http toolkit that take a list of domains to find active domains and other information such as status-code, title, res…☆80Updated 2 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆68Updated 2 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆120Updated last year
- Dump place details from Google Maps like phone,email,website,and reviews☆69Updated 4 months ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- A wacky exploitation framework written in pure python3.☆24Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- Web-See is Tool For Checkout Status Of Urls in Mass Its For Bug Bounty Hunters And Black Hat Hackers It Will Save Your Valuable Time Scr…☆15Updated 3 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆43Updated 2 years ago
- Boost website hits by generating requests from multiple proxy IPs.☆75Updated last year
- Extendable Python script handler for automating penetration testing.☆40Updated 2 years ago
- The Best DDoS Attack Tool + Bypass Cloud Flare CDN For Priv8☆20Updated last year
- Ded Security Framework is a tool aimed at security professionals☆36Updated last year
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆33Updated 8 months ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆51Updated 11 months ago
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- Find Email Spoofing Vulnerablity of domains☆97Updated last year
- This is a working variant of the Mirai IOT botnet☆14Updated 2 years ago
- A collection of pentesting web scanners☆35Updated last year
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆42Updated 2 years ago
- C2Matrix Automation☆13Updated 2 years ago
- A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numb…☆159Updated 7 months ago
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆90Updated 6 months ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Updated 9 months ago
- Information Gathering Simplified.☆72Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Kali Packerge Manager☆65Updated last year