The state of the art network attack and monitoring framework.
☆17Mar 5, 2018Updated 8 years ago
Alternatives and similar repositories for bettercap
Users that are interested in bettercap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Unified repository for different Metasploit Framework payloads☆22Oct 25, 2017Updated 8 years ago
- An HTTP proxy library for Go☆16Jun 22, 2022Updated 3 years ago
- Short script to decode output logs of *sslsplit* raw HTTP packets.☆17Aug 12, 2016Updated 9 years ago
- A generator of weird files (binary polyglots, near polyglots...)☆15Sep 24, 2024Updated last year
- Proof of Concepts (PE, PDF...)☆15Apr 15, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.☆16Jul 12, 2021Updated 4 years ago
- A swiss army knife for pentesting networks☆24Mar 16, 2023Updated 3 years ago
- Yet another OSINT automator.☆18Nov 15, 2020Updated 5 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆21Sep 24, 2024Updated last year
- The unobtrusive time tracker☆19May 23, 2023Updated 2 years ago
- RTTTL txt files that will work with the FIipperZero Music Player☆20Sep 24, 2024Updated last year
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆17Feb 20, 2026Updated last month
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆17Jan 7, 2025Updated last year
- Turn PuTTY into an SSH login bruteforcing tool.☆25Nov 21, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A GitHub action for turning scanned PDF's into searchable documents☆15Mar 2, 2025Updated last year
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Oct 13, 2020Updated 5 years ago
- Decode Flipper zero's raw .sub file (OOK, Manchester)☆28Aug 9, 2022Updated 3 years ago
- Alfred is a advanced OSINT information gathering tool☆11Nov 14, 2025Updated 4 months ago
- HackerGPT is an advanced AI designed for cybersecurity professionals, ethical hackers , MalWare, and penetration testers. It assists in v…☆16Feb 20, 2026Updated last month
- An AI agent to use Ghidra with any AI.☆24Mar 31, 2025Updated 11 months ago
- This is a collection of everything I have and am learning about OSINT. Feel free to send pull requests adding more stuff! I want to learn…☆12Jan 2, 2024Updated 2 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆355Jun 18, 2024Updated last year
- PowerShell Obfuscator☆11Jul 21, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- iOS devicetree utils☆11Aug 31, 2023Updated 2 years ago
- A comprehensive OSINT (Open Source Intelligence) script that gathers detailed information about a target domain using various public sour…☆18May 19, 2024Updated last year
- Go HTTP client w/ HTTPS and SOCKS5 Proxy Load-balancing, Failover, Retries, Authentication, and RoundTripper☆28Jul 3, 2025Updated 8 months ago
- android-ndk for termux☆16Apr 10, 2021Updated 4 years ago
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Flipper SUB Plotters / comparers!☆27Apr 15, 2023Updated 2 years ago
- A GUI tool for Brute Force Login in a web page with Python, hack accounts on any website with a good dictionary of words. Also brute forc…☆28Apr 26, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 8 months ago
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Mar 23, 2025Updated last year
- We ❤️ smolagents - Building Agents Approaches ... to solve use-cases☆13Jan 4, 2025Updated last year
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- An AI agent that performs a security audit on a target codebase.☆24Mar 31, 2025Updated 11 months ago
- Tool CTF Forensik File extract/convert☆15Mar 22, 2024Updated 2 years ago
- USB probe application for macOS☆15Jan 24, 2021Updated 5 years ago