dx7er / CreepLinks
Python Toolkit containing different Cyber Attacks Tools
☆27Updated last year
Alternatives and similar repositories for Creep
Users that are interested in Creep are comparing it to the libraries listed below
Sorting:
- Basic Keylogger in C++☆15Updated 4 years ago
- Python script to extract passwords☆11Updated 2 years ago
- Simple Virtual Desktop Assistant☆12Updated 3 years ago
- A web vulnerability scanner python script.☆20Updated 2 years ago
- Snake Game in C++☆12Updated 3 years ago
- DOS script☆13Updated 3 years ago
- This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / pe…☆11Updated last year
- Config files for my GitHub profile.☆14Updated 9 months ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- Remote persistent keylogger for Windows and Linux..☆12Updated 2 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆74Updated last year
- A Sophisticated, Automated, AI-Driven, State-Sponsored Cyber-Espionage/Counter-Espionage & Zero Click AI-Gen Supply Chain Attack Framewor…☆15Updated last month
- Log keystrokes, take screenshots and grab system information from a target host and exfiltrate to Discord and Google Forms.☆21Updated last year
- A proof-of-concept Node.js ransomware☆21Updated 3 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Hax is a mini-tool with really useful hacking tools.☆18Updated 2 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆25Updated 2 years ago
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆81Updated last month
- Search Google Dorks like Chad. / Broken link hijacking tool.☆28Updated this week
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆12Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated last year
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆15Updated last year
- web application pentesting tools for docker☆18Updated 2 years ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆16Updated 7 months ago
- Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live opera…☆18Updated 2 years ago
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆20Updated last year
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆67Updated 2 years ago
- Gmail/GSuite account enumeration tool☆51Updated last year
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆14Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago