๐ฅ Pentest Cheat Sheet
โ36Aug 10, 2021Updated 4 years ago
Alternatives and similar repositories for DeathNote
Users that are interested in DeathNote are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find themโ17Feb 1, 2021Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.โ28Dec 29, 2021Updated 4 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.โ15Apr 13, 2023Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigationsโ17Dec 6, 2020Updated 5 years ago
- An Advanced PHP Cryptography Frameworkโ16Feb 12, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient โข AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Proof of concept about the privilege escalation flaw identified in Google's Osconfigโ10Sep 20, 2020Updated 5 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., reโฆโ18Jun 30, 2020Updated 5 years ago
- Human Oriented SHellโ31Updated this week
- Automated NoSQL database enumeration and web application exploitation tool.โ25May 6, 2019Updated 7 years ago
- Simple but sharp ransomwareโ38Jul 11, 2020Updated 5 years ago
- โ17Jan 2, 2020Updated 6 years ago
- ๐ The Offensive Pythonโ20Jun 4, 2021Updated 4 years ago
- Vulnerability Knowledge Base comparison toolโ13Feb 9, 2022Updated 4 years ago
- Post-Auth RCE & Persistence on UOKOO Security Camerasโ13Nov 17, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer โข AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ๆปๅปJava Webๅบ็จ-[Java Webๅฎๅ จ]โ15Dec 9, 2020Updated 5 years ago
- Flexible Penetrate Testing Auxiliary Suiteโ73Jun 19, 2023Updated 2 years ago
- AliGuard PHP WAFโ12Feb 16, 2024Updated 2 years ago
- Wi-Fi Exploit Toolโ50May 23, 2020Updated 5 years ago
- PEDA - Python Exploit Development Assistance for GDBโ24Aug 6, 2025Updated 9 months ago
- Educational Botnet for portable pentesting ๐โ48May 10, 2026Updated last week
- Yet another OSINT automator.โ18Nov 15, 2020Updated 5 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect thaโฆโ16Mar 10, 2026Updated 2 months ago
- YARA rule-based automation system to detect network attacks at byte-levelโ13May 12, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean โข AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Gmail shell, for hackers execute commands via gmailโ20Feb 3, 2021Updated 5 years ago
- โ19Dec 15, 2018Updated 7 years ago
- Web application recon for bug bountyโ21Apr 19, 2020Updated 6 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)โ43Dec 2, 2020Updated 5 years ago
- ้ๆBeaconโ15Aug 25, 2024Updated last year
- A Payload Injector for bugbounties written in goโ70Jul 18, 2020Updated 5 years ago
- Next generation cyber security research and testing software.โ16Mar 18, 2021Updated 5 years ago
- Nuubi Tools (Information-ghatering|Scanner|Recon.)โ87Jun 27, 2020Updated 5 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.โ11Mar 13, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways โข AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Extract endpoints from specific Git repository for fuzzingโ23Nov 3, 2020Updated 5 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitationโ21Jul 4, 2020Updated 5 years ago
- Ashok is a Osint Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration tโฆโ26May 8, 2020Updated 6 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stackโ13Apr 18, 2020Updated 6 years ago
- SubDomain Finderโ13Nov 9, 2021Updated 4 years ago