evilsocket / arcLinks
A manager for your secrets.
☆954Updated last year
Alternatives and similar repositories for arc
Users that are interested in arc are comparing it to the libraries listed below
Sorting:
- shellz is a small utility to manage your ssh, telnet, kubernetes, winrm, web or any custom shell in a single place.☆606Updated last year
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆537Updated 3 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Updated 6 years ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆449Updated 7 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆360Updated 3 months ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆411Updated 2 years ago
- caplets and proxy modules.☆510Updated 8 months ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆583Updated 8 years ago
- SSH man-in-the-middle tool☆1,726Updated 4 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,279Updated last year
- Capture handshakes of nearby WiFi networks automatically☆774Updated 4 years ago
- Salamandra is a tool to find spy microphones that use radio freq to transmit. It uses SDR.☆838Updated 4 years ago
- Modern tactical exploitation toolkit.☆852Updated last month
- A framework for wireless pentesting.☆1,225Updated 5 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆627Updated 7 years ago
- This repository has been combined with mac-tracker project and no longer receives updates.☆573Updated 5 months ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,646Updated 5 years ago
- bettercap's web UI☆352Updated 3 months ago
- Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?☆418Updated 4 years ago
- raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees usin…☆793Updated 5 years ago
- A web front-end for password cracking and analytics☆622Updated 4 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,806Updated last year
- A mostly-serverless distributed hash cracking platform☆817Updated last year
- 🧠 A tool that makes AI easier.☆298Updated last year
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆402Updated 8 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆620Updated 2 months ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆374Updated 2 years ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆717Updated last year
- Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.☆522Updated 8 years ago
- 🔓Crack hashes using online rainbow & lookup table attack services, right from your terminal.☆233Updated 2 years ago