dx7er / CreepLinks
Python Toolkit containing different Cyber Attacks Tools
☆28Updated 2 years ago
Alternatives and similar repositories for Creep
Users that are interested in Creep are comparing it to the libraries listed below
Sorting:
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆68Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated 2 weeks ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- Search Google Dorks like Chad. / Broken link hijacking tool.☆30Updated 2 months ago
- proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, …☆33Updated 2 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆128Updated last year
- Script to facilitate different functions and checks☆45Updated 3 years ago
- A fast and powerful http toolkit that take a list of domains to find active domains and other information such as status-code, title, res…☆80Updated 3 years ago
- Perform OSINT on external targets using Shodan☆22Updated last year
- Dump place details from Google Maps like phone,email,website,and reviews☆71Updated 6 months ago
- A tool designed to analyse email headers☆39Updated 3 years ago
- Find Email Spoofing Vulnerablity of domains☆97Updated last year
- Proof of concept denial of service over TOR stress test tool☆42Updated 7 years ago
- ☆133Updated 2 years ago
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆37Updated 3 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆47Updated 2 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- The BackDoor of HIPHP gives you the power to control websites based on PHP using HTTP/HTTPS protocol. By sending files, tokens and comman…☆216Updated 3 weeks ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆54Updated last year
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆79Updated last year
- A simple port scanner using python☆16Updated 2 years ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆91Updated last year
- TorghostNG - Make all your internet traffic anonymized with Tor network. Rewritten from TorGhost with Python 3☆55Updated 5 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆22Updated 2 weeks ago
- Kali Packerge Manager☆65Updated 2 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆25Updated 2 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆111Updated 2 months ago
- Fastest tool to find username and password brute forcing.☆74Updated last year
- web application pentesting tools for docker☆18Updated 3 years ago
- Extendable Python script handler for automating penetration testing.☆38Updated 2 years ago