lockness-Ko / wotLinks
Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live operating system and docker image for hiding yourself by routing all your traffic through TOR
☆18Updated 3 years ago
Alternatives and similar repositories for wot
Users that are interested in wot are comparing it to the libraries listed below
Sorting:
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Updated 3 years ago
- Extendable Python script handler for automating penetration testing.☆39Updated 2 years ago
- A tool designed to analyse email headers☆39Updated 3 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Updated 3 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆49Updated 2 years ago
- Sifter - All purpose penetration testing op-center☆81Updated 3 years ago
- web application pentesting tools for docker☆17Updated 3 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆34Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated 2 years ago
- Dump place details from Google Maps like phone,email,website,and reviews☆71Updated 6 months ago
- Ransomware groups posts☆43Updated this week
- Bifrost C2. Open-source post-exploitation using Discord API☆48Updated 4 years ago
- PHP lab to test captcha bypassing☆30Updated last year
- Find Email Spoofing Vulnerablity of domains☆97Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆45Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- A wacky exploitation framework written in pure python3.☆23Updated last year
- Capture screenshots of onion services on an onion service.☆72Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated last year
- Bash script for CTF automating basic enumeration☆42Updated 3 years ago
- ADDS (Active Directory Domain Services)☆28Updated 2 years ago
- Full Valid Fake Data Generator☆101Updated last year
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆20Updated 3 years ago
- Central IoC scanner based on Loki☆20Updated 4 years ago