ghostwond3r / tellme
Save time on collecting subdomains, attributing IPs and then basic nmap scan.
☆14Updated 2 years ago
Alternatives and similar repositories for tellme:
Users that are interested in tellme are comparing it to the libraries listed below
- Self-installation for ethical hacking☆31Updated last year
- How to install Kali in VirtualBox☆14Updated 11 months ago
- Free courses☆72Updated 2 years ago
- Automated task after new installation of Kali Linux + NewBlood helper☆40Updated last year
- New Blood Project☆80Updated last year
- Built to learn ethical hacking on your own☆135Updated 11 months ago
- Crawls URL to get a better image of what is tied to a website.☆33Updated last year
- Information Gathering Simplified.☆64Updated 2 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆60Updated last year
- An OSINT focused tool made with Nodejs!☆92Updated 2 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆39Updated 2 years ago
- Evildork targeting your fiancee👁️☆85Updated last year
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆21Updated last year
- Minecraft OSINT tool☆55Updated last year
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆36Updated 4 months ago
- Usefull telegram for data leaks, tutorials, free course.☆87Updated 8 months ago
- Extendable Python script handler for automating penetration testing.☆39Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- Clipboard poisoning attack.☆56Updated 4 years ago
- A tool for building remote access trojan.☆5Updated last year
- Red Team scripts written in python☆17Updated 2 years ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated 11 months ago
- ☆32Updated 3 years ago
- A tool for steganography of png files .☆23Updated 2 years ago
- functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forger…☆83Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆45Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- ☆27Updated 2 years ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The …☆40Updated 3 years ago