Phishing can't get any easier with Tilapia
β11Jan 2, 2023Updated 3 years ago
Alternatives and similar repositories for tilapia
Users that are interested in tilapia are comparing it to the libraries listed below
Sorting:
- π¨ Quick tool to finds and extract email addresses from a body of textβ12Apr 15, 2023Updated 2 years ago
- View emails in Discord using Cloudflare Email Routingβ10Dec 15, 2023Updated 2 years ago
- β12Jun 12, 2021Updated 4 years ago
- My attempt to turn Emacs into VSCodeβ10May 19, 2025Updated 10 months ago
- Herramienta en desarrollo la cual busca la sencillez a la hora de hacer PenTesting Ethicos. [NO ME HAGO RESPONSABLE DEL MAL USO DE ESTA Hβ¦β11Aug 1, 2023Updated 2 years ago
- β13Nov 3, 2023Updated 2 years ago
- Attack Surface Mapper is a reconnaissance tool that uses a mixture of open source intellgence and active techniques to expand the attack β¦β18Apr 8, 2024Updated last year
- Full Deobfuscator for PEUnion 4.0.0 (.NET & PE32)β23Apr 21, 2022Updated 3 years ago
- Telegram Group Manager Bot Written In Python Using Pyrogram.β12Aug 25, 2023Updated 2 years ago
- First level taint implementation with qemu for linux user modeβ28Aug 11, 2020Updated 5 years ago
- against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possibleβ¦β21Feb 27, 2016Updated 10 years ago
- A customized mixed PT-BR wordlist for pentesting purposes.β14Apr 14, 2019Updated 6 years ago
- Trace a program using CPU tracer technology.β27Nov 9, 2022Updated 3 years ago
- CopyToAsm (x64) - A Plugin For x64dbgβ31Jul 17, 2018Updated 7 years ago
- π A web presentation for explaining secure coding best practicesβ25Jun 16, 2023Updated 2 years ago
- Quixotic Color Scheme for Papirus Iconsβ19Aug 16, 2022Updated 3 years ago
- β13Feb 7, 2020Updated 6 years ago
- β29Nov 14, 2022Updated 3 years ago
- Write and execute PHP with only 6 different characters: ([.^])β20Sep 5, 2021Updated 4 years ago
- De4dot MOD with few unpackers addedβ14Oct 11, 2016Updated 9 years ago
- OSS-Fuzz Public Corpora Crawlerβ30Feb 23, 2023Updated 3 years ago
- Use Ghidra Structs in Pythonβ30Mar 28, 2021Updated 4 years ago
- An astronomical collection of space-related cybersecurity tools πβ¨β25Jul 9, 2023Updated 2 years ago
- A python script to hide information over an audio file in .wav formatβ19Oct 7, 2017Updated 8 years ago
- The Fuzzil is a program which injects automatically data into a webpage and detect potential bugs.β21Mar 5, 2020Updated 6 years ago
- π Improve your files enumeration with specific extensions!β17Jan 11, 2022Updated 4 years ago
- Check arbitrary file download vulnerability in the WordPressβ23Feb 21, 2020Updated 6 years ago
- β35Feb 10, 2023Updated 3 years ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackinβ¦β416Sep 8, 2025Updated 6 months ago
- Install any apk into dual app spaceβ27Jan 28, 2022Updated 4 years ago
- Simple GUI app to simplify manual string decryption with de4dotβ27Jan 25, 2022Updated 4 years ago
- β30Aug 8, 2023Updated 2 years ago
- de4dot fixed to handle "anti-de4dot" interface adderβ33Jun 6, 2020Updated 5 years ago
- Twin-Hex Cipher Encoder/Decoderβ21Jul 23, 2023Updated 2 years ago
- Offical Writeups for n00bzCTF2023β22Jun 15, 2023Updated 2 years ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscanβ31Jan 8, 2026Updated 2 months ago
- Herramienta enfocada a Blindar/Proteger nuestro equipo para que todo rastro que deje en Internet o en Redes Locales sea Falso e Inrasteabβ¦β29Sep 1, 2023Updated 2 years ago
- IP2Tor allows to determine whether an IP address is a Tor exit node.β30Jul 6, 2020Updated 5 years ago
- Run CTF challenges with netcat in one docker container.β39Aug 5, 2023Updated 2 years ago