m0zgen / cactusd
🌵 Command and Action routine Server
☆14Updated this week
Alternatives and similar repositories for cactusd:
Users that are interested in cactusd are comparing it to the libraries listed below
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated last year
- ☆14Updated 2 years ago
- Get info about accounts of ok.ru by phone number / email address☆14Updated 6 months ago
- Collection of scripts / samples / snippits around the community service at www.filescan.io☆11Updated 2 months ago
- Advanced version of YaSeeker tool for gathering of information about Yandex account☆14Updated 11 months ago
- Search-Scan-Save-Notify☆12Updated 3 years ago
- Transparent proxy through Tor with optionally DNSCrypt and Anonymized-DNS feature enabled.☆14Updated 8 months ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Capturing audio (.wav) from target using a link☆12Updated 5 years ago
- Program to detect and remove the root level SSL certificates installed by NCALayer program☆12Updated 5 years ago
- New version of deanonymiser bot☆9Updated 3 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆49Updated last year
- Emulate the handshake packets of an RDP server with python☆15Updated 6 years ago
- Another Hardening Windows Tool☆51Updated 7 months ago
- Networks and Tools that are used to access and navigate on "darknets"☆45Updated 9 months ago
- Domain Seeker☆12Updated last year
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Updated 3 years ago
- A guide to osint research, including osint information and tools about japan. approaches to non-japanese speaking countries.☆33Updated last year
- Scan and decode NetWire logs☆11Updated 2 years ago
- Java network leaks detection utility with easy configurable algorithms☆22Updated 8 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆13Updated 5 years ago
- Tor bridge running obfs4 obfuscation protocol in Alpine 🐳☆8Updated last year
- Dump Windows registry hives as text.☆16Updated 6 years ago
- Converts binary files of 1C (1CD, cf, epf, efd, etc.) to grepable CSV☆12Updated last year
- Reports issued by Enable Security☆10Updated 2 years ago
- ☆34Updated last year
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- ☆17Updated last week
- TRCERT (USOM) Malware Lists - Fetched and parsed from https://www.usom.gov.tr/url-list.txt☆11Updated this week