kp-forks / ghost-1
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
☆55Updated 4 years ago
Alternatives and similar repositories for ghost-1:
Users that are interested in ghost-1 are comparing it to the libraries listed below
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆133Updated 4 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆59Updated 3 years ago
- An OSINT focused tool made with Nodejs!☆93Updated 2 years ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 5 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 5 months ago
- Full Valid Fake Data Generator☆95Updated 4 months ago
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆65Updated last year
- GUI Osint Framework with Kali Linux☆145Updated last year
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆105Updated 2 months ago
- Information Gathering tool for a Website or IP address☆45Updated last year
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.☆65Updated 5 months ago
- List of Github repositories and articles with list of dorks for different search engines☆28Updated 2 years ago
- ☆144Updated last year
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆108Updated last year
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆83Updated 4 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆93Updated 6 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆66Updated 11 months ago
- Subdomain Bruteforce - Bounty Quick Code☆30Updated 5 months ago
- ☆27Updated 2 years ago
- An Encrypted File transfer via AES-256-CBC☆48Updated 3 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆67Updated last year
- A tool for WI-FI penetration testing that automates your attacking processes.☆29Updated 6 months ago
- Hit valid URL☆22Updated 3 years ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆237Updated 5 months ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆36Updated 2 years ago
- Ultimate Google Dork Lists OSWP top 10☆54Updated 6 months ago
- An OSINT Framework project based on Python☆105Updated 8 months ago
- A python script to perform dorks using DuckDuckGo search engine.☆86Updated 6 years ago
- Nice list of google dorks for SQL injection☆123Updated 6 years ago
- Information Gathering Simplified.☆64Updated 2 years ago