dx7er / CreepLinks
Python Toolkit containing different Cyber Attacks Tools
☆28Updated 2 years ago
Alternatives and similar repositories for Creep
Users that are interested in Creep are comparing it to the libraries listed below
Sorting:
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last week
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆22Updated last month
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆68Updated 2 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆127Updated last year
- ☆10Updated 4 years ago
- Search Google Dorks like Chad. / Broken link hijacking tool.☆30Updated 3 months ago
- Fastest tool to find username and password brute forcing.☆75Updated last year
- redteamrecipe.com☆24Updated last year
- Script to facilitate different functions and checks☆44Updated 3 years ago
- Kali Packerge Manager☆65Updated 2 years ago
- Perform OSINT on external targets using Shodan☆22Updated last year
- DNSrecon tool with GUI for Kali Linux☆60Updated 3 years ago
- PHP lab to test captcha bypassing☆30Updated last year
- A fast and powerful http toolkit that take a list of domains to find active domains and other information such as status-code, title, res…☆80Updated 3 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆57Updated last year
- Social Engineering Browser Update Attack.☆59Updated 2 years ago
- Rubber Ducky powered by NeoKey☆28Updated last year
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆25Updated 2 years ago
- A Simple Script For SSH BruteForce☆38Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆64Updated last year
- proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, …☆33Updated 2 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆41Updated 2 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- A automated Meterpreter payload generator script in Bash That can start Listener automatically for specified payload. (only for KALI Linu…☆16Updated 4 years ago
- Gmail/GSuite account enumeration tool☆55Updated last year
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Updated last year