☆432Nov 23, 2023Updated 2 years ago
Alternatives and similar repositories for Zydra
Users that are interested in Zydra are comparing it to the libraries listed below
Sorting:
- SSH Reverse Tunnels with Login Notifications via Telegram Bot☆31Feb 22, 2023Updated 3 years ago
- Convert any binary data to a PNG image file and vice versa.☆135Dec 25, 2023Updated 2 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- ☆31Jul 14, 2022Updated 3 years ago
- Morse code encoder and decoder with supports Latin, Cyrillic.☆31Sep 3, 2022Updated 3 years ago
- A console utility to bring up new Tor nodes easily☆24May 7, 2022Updated 3 years ago
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- HDDSuperClone, HDDSuperTool☆416Mar 8, 2025Updated last year
- This is a soft fork of the Megalodon app, which itself is a fork of the official Mastodon Android app.☆14Jan 27, 2023Updated 3 years ago
- Firewall module using Netfilter kernel framework hook functions☆11May 20, 2022Updated 3 years ago
- A zero knowledge messaging system built on zcash.☆40May 18, 2021Updated 4 years ago
- An Android App that can be used as laptop touchpad via local Network☆190Mar 1, 2026Updated 2 weeks ago
- Recieve raw network trafic dump in pcap-format and parse it to squid-proxy log. Then generate report for lightsquid and shows it in Web U…☆89Apr 12, 2023Updated 2 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in C.☆177Aug 16, 2024Updated last year
- ☆128May 22, 2023Updated 2 years ago
- Tracking history of USB events on GNU/Linux☆1,177Oct 3, 2022Updated 3 years ago
- If you want know, who use your computer when you are not nearby!☆48Sep 30, 2021Updated 4 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- A GAN based framework for CAPTCHA breaking in the dark web.☆163Jan 14, 2022Updated 4 years ago
- Let's find someone's account☆168Jun 13, 2019Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- 📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-de…☆1,535Jun 27, 2022Updated 3 years ago
- Automatically fix high dynamic range images☆49Jul 21, 2023Updated 2 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆271Mar 24, 2021Updated 4 years ago
- Turn images into sounds viewable on a spectrogram!☆159Jan 21, 2020Updated 6 years ago
- Advanced Hash Manipulation☆176Oct 14, 2019Updated 6 years ago
- Simple tool to visualize and amplify mouse movements☆75May 12, 2021Updated 4 years ago
- Local file inclusion exploitation tool☆931Oct 1, 2025Updated 5 months ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆54Mar 11, 2024Updated 2 years ago
- File encryption done right☆36Mar 8, 2026Updated last week
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 3 years ago
- Run scripts for each Linux desktop notification.☆15Jul 8, 2022Updated 3 years ago
- Yet another python sms library☆94Nov 22, 2022Updated 3 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Apr 29, 2019Updated 6 years ago
- Scripts for pentesting/hacking☆18Jan 22, 2022Updated 4 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Aug 21, 2019Updated 6 years ago
- ☆17Mar 21, 2019Updated 6 years ago
- Free speech to text☆134Dec 1, 2023Updated 2 years ago