lmsecure / SetezorLinks
Setezor is a network traffic analyzer with the ability to automatically build network topology
☆178Updated last month
Alternatives and similar repositories for Setezor
Users that are interested in Setezor are comparing it to the libraries listed below
Sorting:
- Friendly graphical output of the nmap tool that allows filtering by open ports☆186Updated 3 years ago
- Light-weight web security scanner☆150Updated last month
- Modern web-based distributed hashcracking solution, built on hashcat☆190Updated this week
- Hackings style defence tricks☆56Updated 2 weeks ago
- Automated Hardening Framework for Ubuntu☆116Updated last year
- File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-2…☆144Updated last year
- Reverse proxies cheatsheet☆25Updated 2 years ago
- ☆393Updated 7 months ago
- A monster cheatsheet on MITM attacks☆367Updated 7 months ago
- Ресурсы, связанные с безопасностью приложений, исследователями и разработчиками в области безопасности.☆51Updated 3 years ago
- All in 1 phishing framework☆37Updated 3 years ago
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆188Updated last year
- ☆136Updated 4 years ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Updated last year
- Набор инструментов для OSINT в VKontakte. Основано на материалах Rawrdcore☆186Updated 2 years ago
- A bash script for performing advanced Google dork searches to find files, names, usernames, emails, phone numbers, and images.☆29Updated last year
- Payload for jpg file☆64Updated last year
- Linux-based botnet builder designed for creating advanced botnet payloads.☆105Updated 2 months ago
- vusialization of geo points from photos from vk profile☆47Updated 3 years ago
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆29Updated last month
- Репозиторий содержит список вопросов по наступальной безопасности.☆357Updated 2 months ago
- Local encrypt and decrypt telegram messages using secret keys.☆40Updated last year
- ☆166Updated last year
- Convert any binary data to a PNG image file and vice versa.☆136Updated 2 years ago
- Cisco IOS Security Inspector☆40Updated 2 weeks ago
- https://t.me/+V6d8SvKVFXo2MjIy☆41Updated 2 years ago
- TelAnalysis - Telegram Analysis tool☆151Updated 10 months ago
- The DNA test for websites☆75Updated last month
- ☆143Updated 5 years ago
- 🔎 OSINT Maltego Transforms for investigating Telegram channels, groups, and users, including deanonymization via stickers, forwarded mes…☆406Updated last week