Labsecurity is a tool that bundles ethical hacking python scripts into a single tool with cli interface.
☆68Feb 20, 2023Updated 3 years ago
Alternatives and similar repositories for labsecurity
Users that are interested in labsecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bark Toolkit is a toolkit wich provides Denial-of-service attacks, SMS attacks and more.☆54Oct 23, 2021Updated 4 years ago
- Sashay is an automatic installer for useful tools.☆202Nov 3, 2022Updated 3 years ago
- A heavily armed customizable phishing tool for educational purpose only☆711May 24, 2025Updated 9 months ago
- Venom-Tool-Installer is a Kali Linux hacking tools installer for Termux and linux system. Venom-Tool-Installer was developed for Termux a…☆674Apr 16, 2022Updated 3 years ago
- ITWSV- Integrated Tool for Web Security Vulnerability☆67Nov 28, 2019Updated 6 years ago
- GitHubUserDataExtractor is a cross-platform Python tool designed to extract and display public GitHub user data both in the terminal and …☆22Sep 11, 2025Updated 6 months ago
- ☆31May 22, 2024Updated last year
- A production-grade, single codebase cross-platform UI framework with reactive signals, streaming SSR, and GPU rendering.☆63Feb 19, 2026Updated last month
- Grab cam shots from target's phone front camera or PC webcam just sending a link. Author will not be responsible for any misuse of this t…☆137Jul 1, 2025Updated 8 months ago
- 🔥Ready, Aim, Fire.🔥☆18Jun 3, 2022Updated 3 years ago
- "Kali replacer." It has a large number of hacking tools.☆41Mar 31, 2020Updated 5 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Jun 21, 2021Updated 4 years ago
- HOW TO FIX THE MISSING FIRMWARE OR THE NONFREE FIRMWARE AFTER KALI-LINUX INSTALLATION☆39Sep 25, 2018Updated 7 years ago
- CyberPreacher cloud project collection☆16Dec 21, 2025Updated 3 months ago
- A small Go program to read /var/log/audit/audit.log☆14Nov 12, 2018Updated 7 years ago
- Bug Hunting Penetration RGB Hat are red, gray, and black hat☆19Jan 21, 2026Updated 2 months ago
- Tools for Pentesting that all hacker need....☆17Aug 26, 2022Updated 3 years ago
- Top Things to do After Installing Kali Linux☆122May 21, 2024Updated last year
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆26Aug 2, 2025Updated 7 months ago
- Linux installer stuffs☆11Aug 7, 2025Updated 7 months ago
- NITRO, PAYSAFECARD, STEAM CODES GENERATOR☆14Jun 17, 2022Updated 3 years ago
- Web Vulnerability Scanner.☆13Mar 30, 2022Updated 3 years ago
- Ip-Recon is a python powerful reconnaissance tool for retrieving ip address information by using Geo.ipfy API, it developed for termux a…☆37Jul 13, 2024Updated last year
- ¿Sospechas que un archivo podría contener información oculta o maliciosa? Ésta herramienta de análisis avanzado escanea PDFs, documentos …☆21Apr 2, 2025Updated 11 months ago
- Compare the given environment variable value across all the processes☆16Dec 5, 2024Updated last year
- Acunetix - Vulnerability Scanner install + licensed (included docker version)☆13Jul 23, 2025Updated 8 months ago
- An Internet solution for AnLinux projects (Released)☆14May 3, 2022Updated 3 years ago
- ☆10Feb 27, 2022Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- Visualize in a tree-like structure☆11Sep 2, 2024Updated last year
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- Receipt Generator using PIL, Python☆17Mar 21, 2019Updated 7 years ago
- DirAttack tools, Search file or directory on website☆50Nov 7, 2019Updated 6 years ago
- ☆10Mar 30, 2019Updated 6 years ago
- This tool is used to send mail anonmously.☆14Sep 25, 2023Updated 2 years ago
- A tool designed to analyse email headers☆40Oct 4, 2022Updated 3 years ago
- Social Engineering Definition. Social engineering is a manipulation technique that exploits human error to gain private information, acce…☆22May 26, 2023Updated 2 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆25Nov 12, 2025Updated 4 months ago
- Want .uf2 files for your switch hacking needs? ask and link to the .bin payload you want, and I may get to it in my free time. I understa…☆17Feb 4, 2021Updated 5 years ago