lockness-Ko / wotLinks
Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live operating system and docker image for hiding yourself by routing all your traffic through TOR
☆18Updated 3 years ago
Alternatives and similar repositories for wot
Users that are interested in wot are comparing it to the libraries listed below
Sorting:
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Updated 3 years ago
- Sifter - All purpose penetration testing op-center☆81Updated 3 years ago
- web application pentesting tools for docker☆17Updated 3 years ago
- A tool designed to analyse email headers☆40Updated 3 years ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- Small python script to look for common vulnerabilities on SMTP server.☆48Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Updated 2 years ago
- PHP lab to test captcha bypassing☆30Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Updated 4 years ago
- Full Valid Fake Data Generator☆101Updated last year
- Capture screenshots of onion services on an onion service.☆73Updated last year
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Updated 3 years ago
- Extendable Python script handler for automating penetration testing.☆39Updated 2 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22Updated 8 months ago
- ADDS (Active Directory Domain Services)☆28Updated last week
- An automated e-mail OSINT tool☆23Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated last year
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆33Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Updated 3 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Updated 4 years ago
- ☆72Updated 2 years ago
- Bash script for CTF automating basic enumeration☆42Updated 3 years ago
- A tool for steganography of png files .☆24Updated 3 years ago
- Central IoC scanner based on Loki☆20Updated 4 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Updated 3 years ago
- Ransomware groups posts☆44Updated this week