everythingBlackkk / Youtube_C2Links
☆12Updated 5 months ago
Alternatives and similar repositories for Youtube_C2
Users that are interested in Youtube_C2 are comparing it to the libraries listed below
Sorting:
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆43Updated 2 months ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- ☆46Updated 6 months ago
- ☆19Updated 2 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆23Updated last month
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆40Updated 2 years ago
- ☆43Updated 5 months ago
- A tool for listing and extracting installed Android APKs and decrypted iOS IPAs (plus app storage) from rooted or jailbroken devices.☆33Updated 4 months ago
- ☆20Updated 4 years ago
- ☆15Updated 11 months ago
- ☆24Updated 6 years ago
- ☆65Updated 2 years ago
- King of Bug Bounty Tips Simple Tool☆13Updated 4 years ago
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- OSCP Study Guide☆40Updated 2 years ago
- ☆25Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- ☆29Updated 4 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- ☆34Updated 2 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆13Updated 7 months ago
- Challenge Python☆19Updated 2 years ago
- ☆13Updated 3 years ago
- ☆35Updated 6 months ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆21Updated 3 months ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago