karthi-the-hacker / poseidonView external linksLinks
A cloud based tool for Social engineering attacks and Security audit
☆40Jun 24, 2024Updated last year
Alternatives and similar repositories for poseidon
Users that are interested in poseidon are comparing it to the libraries listed below
Sorting:
- A tool to generate fake profile for filling of form☆11Apr 30, 2023Updated 2 years ago
- Load your data into burp☆11Apr 26, 2023Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆13Aug 26, 2021Updated 4 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- ☆10Jul 16, 2024Updated last year
- Exploiting Android devices☆10Sep 12, 2022Updated 3 years ago
- This is a Packet flooder python program, This tool is created by 47hxl-53r, This tool is created only for educational purposes, Creator …☆10May 5, 2022Updated 3 years ago
- This is a repo for camphish tool for kali linux develop by thelinuxchoise and techchip☆10Nov 2, 2023Updated 2 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- This tool will create a .exe file which will send you all the information of victim once the file executes!☆43Nov 24, 2024Updated last year
- Aid Learning FrameWork is a Linux system running on Android phone for AI programming. It means that when it is installed, your Android m…☆11May 1, 2019Updated 6 years ago
- Scripts to run your own SIM bank SMS receiver☆13Sep 8, 2023Updated 2 years ago
- python script that hide phishing url like a pro "masking url technique"☆42Jul 21, 2021Updated 4 years ago
- CRLF Bug scanner for WebPentesters and Bugbounty Hunters☆44Jun 9, 2023Updated 2 years ago
- ApsaraStack Terraform Provider☆10Aug 28, 2025Updated 5 months ago
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- tl;tr; jhaddix bhmv5☆10Jul 2, 2020Updated 5 years ago
- A python script that finds endpoints in JavaScript files☆10Nov 29, 2019Updated 6 years ago
- Android webviews and securiy☆23Sep 18, 2025Updated 4 months ago
- Scalable URL obfuscator service☆11Feb 14, 2023Updated 3 years ago
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Aug 13, 2022Updated 3 years ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- Google dorks for bug bounty hunting☆12Jul 28, 2021Updated 4 years ago
- Python program for installing many tools automatically☆15Dec 31, 2021Updated 4 years ago
- wordpress xmlrpc + wp-login.php brute force☆10Mar 13, 2021Updated 4 years ago
- MiniO verify interface sensitive information disclosure vulnerability (CVE-2023-28432)☆10Mar 24, 2023Updated 2 years ago
- A tool to BruteForce ssh. An upgraded version of Hydra. Multiple bruteforce options☆10Jul 9, 2022Updated 3 years ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 2 months ago
- Fake Discord virus video maker written in Python 3.10.6☆7Jan 16, 2023Updated 3 years ago
- Script for conducting DOS-attacks on Bluetooth devices for pentest purposes.☆11Jan 27, 2024Updated 2 years ago
- I DOC VIEW RCE 的poc☆13Nov 23, 2023Updated 2 years ago
- Escáner básico de vulnerabilidades web (XSS, SQLi, cabeceras) con crawling ligero, escrito en Python.☆12Nov 23, 2025Updated 2 months ago
- AI Ethics educational material 🤗☆10Mar 9, 2023Updated 2 years ago
- Simple Antivirus☆10Dec 24, 2016Updated 9 years ago
- Simple web API in php which takes as a parameter with GET requests to launch attacks with scripts present on the machine. There is also …☆11Mar 27, 2021Updated 4 years ago
- ☆11Aug 13, 2024Updated last year
- DDos attack☆10Feb 13, 2023Updated 3 years ago
- A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.☆18Mar 26, 2025Updated 10 months ago