Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.
β112May 30, 2025Updated 10 months ago
Alternatives and similar repositories for GhostLine
Users that are interested in GhostLine are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An OpenAI API Compatible Honeypot Gatewayβ17Mar 17, 2025Updated last year
- π₯οΈ Windows π A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during β¦β54Jan 26, 2026Updated 2 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passworβ¦β41May 7, 2023Updated 2 years ago
- β23Mar 4, 2025Updated last year
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many portsβ61Jul 13, 2025Updated 8 months ago
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- BlueSky OSINT Toolβ14Dec 10, 2024Updated last year
- β164Mar 20, 2026Updated 3 weeks ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptioβ¦β20Mar 22, 2026Updated 2 weeks ago
- A collection of Turbo Intruder scripts.β71Feb 1, 2025Updated last year
- The official website for The Discord Analytics for Risks & Threats Project.β22Dec 29, 2025Updated 3 months ago
- Security tool against dependency typosquatting attacksβ55Mar 31, 2026Updated last week
- FrogPost: postMessage Security Testing Toolβ108Dec 4, 2025Updated 4 months ago
- Persist like a Dodderβ68May 19, 2025Updated 10 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. β¦β111Jul 21, 2025Updated 8 months ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegatβ¦β39Aug 8, 2025Updated 8 months ago
- Web Server Vulnerability Scanning Toolβ36Mar 11, 2025Updated last year
- PoC shadow SaaS and insecure credential detection system using a browser extension.β42Apr 3, 2026Updated last week
- Script to check Azure Front Door WAF for insecure RemoteAddr variableβ29Jul 11, 2025Updated 8 months ago
- Framework for Monitoring File Ingestion Source for Yara Matchesβ51Mar 10, 2025Updated last year
- Addon for BHCEβ57Apr 1, 2025Updated last year
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.β44Sep 16, 2025Updated 6 months ago
- If these strings are in your code, you might have a problem!β51Feb 13, 2026Updated last month
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrencyβ15Nov 13, 2025Updated 4 months ago
- NordVPN Threat Protection Proβ’ β’ AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Ensure your password safety by scanning in data breaches.β116Updated this week
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates β¦β124Jul 19, 2025Updated 8 months ago
- Red Kite, the Extensible Attack Surface Management tool.β89Feb 8, 2026Updated 2 months ago
- CLI tool for searching logs and unstructured content in Amazon S3 bucketsβ218Jul 8, 2025Updated 9 months ago
- An index of publicly available and open-source threat detection rulesets.β130Apr 17, 2025Updated 11 months ago
- A simple POC to expose Mythic as a MCP serverβ73Mar 20, 2025Updated last year
- This script automates SQL injection testing using SQLMap with AI-powered decision making.β421Feb 7, 2026Updated 2 months ago
- A 64 bit executable junk code engine for polymorphic malware.β77Jun 16, 2025Updated 9 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPCβ120Jun 10, 2025Updated 10 months ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CaptainCredz is a modular and discreet password-spraying tool.β134Jul 22, 2025Updated 8 months ago
- ReconPro is a specialized Google dorking tool designed for cybersecurity professionals and bug bounty hunters.β47Mar 22, 2026Updated 2 weeks ago
- Suzaku (ζ±ι) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.β173Mar 29, 2026Updated last week
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged objectβ¦β391Mar 27, 2026Updated 2 weeks ago
- β10May 25, 2023Updated 2 years ago
- Advanced SQLMap command builder with an intuitive cheatsheet UI. Works locally in your browser as a single HTML file (no data sent anywheβ¦β34Jul 6, 2025Updated 9 months ago
- A research project to add some brrrrrr to Burpβ208Feb 16, 2026Updated last month