kp-forks / ghost-1Links
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
☆64Updated 4 years ago
Alternatives and similar repositories for ghost-1
Users that are interested in ghost-1 are comparing it to the libraries listed below
Sorting:
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆151Updated last year
- A Zphisher GUI Back-Office Plugin☆230Updated 2 years ago
- clone from https://sourceforge.net/projects/crunch-wordlist/☆120Updated 9 years ago
- ☆159Updated 2 years ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆129Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆76Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆64Updated 4 years ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆109Updated 2 years ago
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆87Updated 2 weeks ago
- OSINT Framework : A python based Open Source Intelligence CLI framework similar to Metasploit.☆186Updated 3 weeks ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆106Updated 2 years ago
- Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Resea…☆121Updated 3 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆110Updated 10 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆80Updated last year
- Powerful and smart Traffic Anonymizer using tor as a transparent proxy☆34Updated 5 months ago
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆109Updated 2 years ago
- API pwndb☆88Updated 6 years ago
- Magicleaks it's a python script that checks if an email or a list of email accounts was compromised☆69Updated 3 years ago
- Here are the most interesting Shodan dorks (according to me)☆96Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆254Updated 6 months ago
- A tool for automatically change the Tor IP address over time.☆108Updated 6 months ago
- GUI Osint Framework with Kali Linux☆162Updated 2 years ago
- QuadraInspect is an Android framework that integrates AndroPass, APKUtil, and MobFS, providing a powerful tool for analyzing the security…☆350Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆175Updated last year
- RobotScraper is a simple tool written in Python to check each of the paths found in the robots.txt file and what HTTP response code they …☆14Updated last year
- This is a simple Cheat Sheet which can be helpful while pentesting☆50Updated 2 years ago
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆77Updated 2 years ago
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆194Updated 2 years ago
- Redirect All Traffic Through Tor Network For Kali Linux☆202Updated 7 months ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 5 years ago