m4n3dw0lf / vampyLinks
VAMPY - Minimal tool for RAM dumping.
☆10Updated 8 years ago
Alternatives and similar repositories for vampy
Users that are interested in vampy are comparing it to the libraries listed below
Sorting:
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 4 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 7 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆48Updated 9 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆59Updated 10 years ago
- ☆91Updated 8 years ago
- 📡 A security research tool with shodan integration☆25Updated 7 years ago
- Simple security surveillance script for linux distributions.☆59Updated 9 years ago
- ftpknocker is a multi-threaded scanner for finding anonymous FTP servers☆41Updated 6 months ago
- Social Engineering Toys☆36Updated 9 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆125Updated 8 years ago
- Massive arsenal of hacker tools...☆79Updated 8 years ago
- Tool to automatic leak information using Hacking with engine searches☆92Updated 7 years ago
- Poison, reset, spoof, redirect MITM script☆126Updated 2 years ago
- A facebook profile and reconnaissance system☆57Updated 11 years ago
- bash script to help you , doing many penetration testing based on kali linux , help pentester and hackers to deal with kali linux in easy…☆17Updated 10 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆77Updated 6 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆51Updated 8 years ago
- Share wifi on windows with arranged password like every hour or every day☆14Updated 8 years ago
- A simple bash based metasploit automation tool!☆125Updated 2 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆76Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Updated 7 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 7 years ago
- Sends some one a malicious payload through smtp and starts a listener with metasploit.☆36Updated 7 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 9 years ago
- Terminal Ip Lookup Tool☆56Updated 11 years ago
- A python tool that will extract exif data from picture with two methods☆39Updated 4 years ago
- Search google for shellshock vulnerable sites☆27Updated 11 years ago
- WPS scan and pwn tool☆70Updated 6 years ago
- The Watcher version 5.0☆19Updated 8 years ago
- Shodan.io Command Line Interface☆43Updated 4 years ago