gsvprharsha / Hunter-FrameworkLinks
A python based Framework for Ethical Hackers. Provides 6 different tools as of 31/01/2022.
☆13Updated 2 years ago
Alternatives and similar repositories for Hunter-Framework
Users that are interested in Hunter-Framework are comparing it to the libraries listed below
Sorting:
- Collections of way to evade normal detection events.☆25Updated 4 years ago
- A multi-client reverse shell that allows multiple connections from target computers || Hedef bilgisayarlardan gelen birden fazla bağlan…☆19Updated 4 years ago
- ./kumasia php simple backdoor☆24Updated last week
- Burpsuite Plugin to bypass strict RePlay protection☆12Updated 4 years ago
- A tool to check for response status codes with ease☆14Updated 2 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- 「🚪」Port forwarding tool to gain access to internal devices☆12Updated 7 months ago
- This repository has the unified data required to perform user enumeration on various websites. Content is in a JSON file and can easily b…☆13Updated 3 months ago
- ShellC0de Generator☆11Updated 4 years ago
- Detect Duplicate Images Blazingly Fast☆12Updated 3 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆15Updated last year
- Next generation cyber security research and testing software.☆15Updated 4 years ago
- Real Time Object Detection using OpenCV and Deep Learning☆10Updated 5 months ago
- pentester payload ,info hunte☆11Updated 3 years ago
- A bundle of bash scripts to make headless crypto mining on linux a simple reality. Unfortunately only NVIDIA support for now.☆18Updated 4 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆50Updated 8 months ago
- originip finds origin ip from dig, shodan, censys, securitytrails, viewdns, hunter how, fofa, zoomeye.☆8Updated 11 months ago
- This repository is a collection of Awesome XSS Payloads in 1 txt file☆12Updated 5 years ago
- Perform OSINT on external targets using Shodan☆22Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 4 years ago
- This page should help you with the recon for security issues.☆21Updated 2 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆16Updated 2 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆33Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- A fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.☆13Updated last year
- 「🚪」The hidden hookless backdoor☆13Updated 7 months ago
- ☆11Updated 6 months ago
- Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection☆34Updated last year