๐ฅ Pentest Cheat Sheet
โ36Aug 10, 2021Updated 4 years ago
Alternatives and similar repositories for DeathNote
Users that are interested in DeathNote are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find themโ17Feb 1, 2021Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.โ27Dec 29, 2021Updated 4 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.โ15Apr 13, 2023Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigationsโ17Dec 6, 2020Updated 5 years ago
- An Advanced PHP Cryptography Frameworkโ16Feb 12, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean โข AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Proof of concept about the privilege escalation flaw identified in Google's Osconfigโ10Sep 20, 2020Updated 5 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., reโฆโ18Jun 30, 2020Updated 5 years ago
- Simple but sharp ransomwareโ35Jul 11, 2020Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.โ25May 6, 2019Updated 6 years ago
- โ17Jan 2, 2020Updated 6 years ago
- ๐ The Offensive Pythonโ20Jun 4, 2021Updated 4 years ago
- Post-Auth RCE & Persistence on UOKOO Security Camerasโ13Nov 17, 2020Updated 5 years ago
- ๆปๅปJava Webๅบ็จ-[Java Webๅฎๅ จ]โ15Dec 9, 2020Updated 5 years ago
- Flexible Penetrate Testing Auxiliary Suiteโ73Jun 19, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean โข AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- AliGuard PHP WAFโ12Feb 16, 2024Updated 2 years ago
- Wi-Fi Exploit Toolโ50May 23, 2020Updated 5 years ago
- Tool to generate csrf payloads based on vulnerable requestsโ64Oct 9, 2020Updated 5 years ago
- PEDA - Python Exploit Development Assistance for GDBโ24Aug 6, 2025Updated 8 months ago
- Botnet targeting Windows machines ๐โ47Feb 25, 2026Updated last month
- Yet another OSINT automator.โ18Nov 15, 2020Updated 5 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect thaโฆโ16Mar 10, 2026Updated 3 weeks ago
- wifi attacks suiteโ59Sep 24, 2020Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-levelโ13May 12, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean โข AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Gmail shell, for hackers execute commands via gmailโ19Feb 3, 2021Updated 5 years ago
- โ19Dec 15, 2018Updated 7 years ago
- Web application recon for bug bountyโ21Apr 19, 2020Updated 5 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)โ42Dec 2, 2020Updated 5 years ago
- A Payload Injector for bugbounties written in goโ70Jul 18, 2020Updated 5 years ago
- Next generation cyber security research and testing software.โ16Mar 18, 2021Updated 5 years ago
- Nuubi Tools (Information-ghatering|Scanner|Recon.)โ87Jun 27, 2020Updated 5 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.โ11Mar 13, 2024Updated 2 years ago
- Extract endpoints from specific Git repository for fuzzingโ23Nov 3, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean โข AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Ruby script to automate metasploit scanning, exploitation, and post-exploitationโ20Jul 4, 2020Updated 5 years ago
- Docker image for hackingโ21Feb 10, 2025Updated last year
- Ashok is a Osint Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration tโฆโ26May 8, 2020Updated 5 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stackโ12Apr 18, 2020Updated 5 years ago
- ๐ A small Password Attackโ15Apr 1, 2024Updated 2 years ago
- Collection of Jupyter notebooksโ13Mar 11, 2021Updated 5 years ago
- Custom security distro for remote penetration testingโ56Mar 26, 2021Updated 5 years ago