evilsocket / arcLinks
A manager for your secrets.
☆948Updated 10 months ago
Alternatives and similar repositories for arc
Users that are interested in arc are comparing it to the libraries listed below
Sorting:
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆539Updated 2 years ago
- shellz is a small utility to manage your ssh, telnet, kubernetes, winrm, web or any custom shell in a single place.☆604Updated 10 months ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,255Updated 10 months ago
- caplets and proxy modules.☆502Updated 2 months ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆406Updated 2 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,660Updated 6 months ago
- SSH man-in-the-middle tool☆1,659Updated 3 years ago
- A framework for wireless pentesting.☆1,209Updated 4 years ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆449Updated 7 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆357Updated 7 months ago
- bettercap's web UI☆337Updated 6 months ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆701Updated last year
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆244Updated 2 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,095Updated 6 years ago
- USB key cleaner☆472Updated 2 years ago
- CLOSE ACCESS DENIAL.☆1,491Updated this week
- Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.☆509Updated 7 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,604Updated 4 years ago
- A command-line network packet crafting and injection utility☆514Updated last year
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆579Updated 7 years ago
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆493Updated 6 months ago
- Tracking history of USB events on GNU/Linux☆1,167Updated 2 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆372Updated 2 years ago
- A web front-end for password cracking and analytics☆624Updated 3 years ago
- Create multiple TOR instances with a load-balancing.☆1,095Updated 6 months ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆324Updated 5 years ago
- 🔓Crack hashes using online rainbow & lookup table attack services, right from your terminal.☆233Updated 2 years ago
- INTERLOCK - file encryption and HSM front-end☆302Updated last month
- A mostly-serverless distributed hash cracking platform☆807Updated last year
- (⌐■_■) - API server for pwnagotchi.ai☆153Updated 2 years ago