dx7er / CreepLinks
Python Toolkit containing different Cyber Attacks Tools
☆27Updated 2 years ago
Alternatives and similar repositories for Creep
Users that are interested in Creep are comparing it to the libraries listed below
Sorting:
- Search Google Dorks like Chad. / Broken link hijacking tool.☆30Updated 4 months ago
- proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, …☆33Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆41Updated 3 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆36Updated 2 weeks ago
- Web-See is Tool For Checkout Status Of Urls in Mass Its For Bug Bounty Hunters And Black Hat Hackers It Will Save Your Valuable Time Scr…☆15Updated 3 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆58Updated last year
- This tool will help in generating reverse shells easily for all types of OS.☆20Updated 2 years ago
- C2Matrix Automation☆15Updated 2 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Updated 2 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆68Updated 2 years ago
- A fast and powerful http toolkit that take a list of domains to find active domains and other information such as status-code, title, res…☆78Updated 3 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆131Updated last year
- A Simple Script For SSH BruteForce☆38Updated 2 years ago
- A proof-of-concept Node.js ransomware☆21Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21Updated 3 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Updated 2 months ago
- Perform OSINT on external targets using Shodan☆22Updated 2 years ago
- A automated Meterpreter payload generator script in Bash That can start Listener automatically for specified payload. (only for KALI Linu…☆15Updated 4 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 3 years ago
- PrivacyNet: Privacy Network☆54Updated last year
- A windows post exploitation tool that contains a lot of features for information gathering and more.☆46Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆47Updated 2 years ago
- The Best DDoS Attack Tool + Bypass Cloud Flare CDN For Priv8☆19Updated 3 months ago
- Gmail/GSuite account enumeration tool☆55Updated last year
- A certificate transparency log keyword sniffer written in python☆87Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated 2 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆57Updated last year
- DNSrecon tool with GUI for Kali Linux☆60Updated 3 years ago