๐ฅ Pentest Cheat Sheet
โ36Aug 10, 2021Updated 4 years ago
Alternatives and similar repositories for DeathNote
Users that are interested in DeathNote are comparing it to the libraries listed below
Sorting:
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find themโ17Feb 1, 2021Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigationsโ17Dec 6, 2020Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.โ27Dec 29, 2021Updated 4 years ago
- โ17Jan 2, 2020Updated 6 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., reโฆโ18Jun 30, 2020Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-levelโ13May 12, 2021Updated 4 years ago
- An Advanced PHP Cryptography Frameworkโ16Feb 12, 2024Updated 2 years ago
- Meโ30Feb 11, 2023Updated 3 years ago
- ๐ The Offensive Pythonโ20Jun 4, 2021Updated 4 years ago
- Human Oriented SHellโ27Apr 1, 2024Updated last year
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.โ15Apr 13, 2023Updated 2 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfigโ10Sep 20, 2020Updated 5 years ago
- AliGuard PHP WAFโ12Feb 16, 2024Updated 2 years ago
- Simple but sharp ransomwareโ35Jul 11, 2020Updated 5 years ago
- Vulnerability Knowledge Base comparison toolโ13Feb 9, 2022Updated 4 years ago
- SubDomain Finderโ13Nov 9, 2021Updated 4 years ago
- Post-Auth RCE & Persistence on UOKOO Security Camerasโ12Nov 17, 2020Updated 5 years ago
- Flexible Penetrate Testing Auxiliary Suiteโ73Jun 19, 2023Updated 2 years ago
- PEDA - Python Exploit Development Assistance for GDBโ23Aug 6, 2025Updated 6 months ago
- Wi-Fi Exploit Toolโ50May 23, 2020Updated 5 years ago
- ๐ A small Password Attackโ15Apr 1, 2024Updated last year
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect thaโฆโ16Dec 8, 2025Updated 2 months ago
- Next generation cyber security research and testing software.โ16Mar 18, 2021Updated 4 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)โ42Dec 2, 2020Updated 5 years ago
- Gmail shell, for hackers execute commands via gmailโ19Feb 3, 2021Updated 5 years ago
- Yet another OSINT automator.โ18Nov 15, 2020Updated 5 years ago
- โ19Dec 15, 2018Updated 7 years ago
- ๆปๅปJava Webๅบ็จ-[Java Webๅฎๅ จ]โ15Dec 9, 2020Updated 5 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitationโ18Jul 4, 2020Updated 5 years ago
- Docker image for hackingโ21Feb 10, 2025Updated last year
- Botnet targeting Windows machines ๐โ46Updated this week
- Extract endpoints from specific Git repository for fuzzingโ23Nov 3, 2020Updated 5 years ago
- Tool to generate csrf payloads based on vulnerable requestsโ64Oct 9, 2020Updated 5 years ago
- Nuubi Tools (Information-ghatering|Scanner|Recon.)โ87Jun 27, 2020Updated 5 years ago
- wifi attacks suiteโ59Sep 24, 2020Updated 5 years ago
- R3C0Nizer is the first ever CLI based menu-driven web application B-Tier recon framework.โ152Apr 2, 2021Updated 4 years ago
- Web application pentesting reconโ23Jul 25, 2020Updated 5 years ago
- This is a simple network scanner used to scan any range of IP Address to get their MAC Address. The code is written completely in Python โฆโ24Aug 29, 2021Updated 4 years ago
- A collection of tools for managing and automating vulnerability management.โ13Mar 24, 2022Updated 3 years ago