medbenali / CyberScan
CyberScan: Network's Forensics ToolKit
☆443Updated 6 years ago
Alternatives and similar repositories for CyberScan:
Users that are interested in CyberScan are comparing it to the libraries listed below
- Tools for information gathering☆338Updated 9 months ago
- Git all your favorite tools in one click☆262Updated 2 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆250Updated 4 years ago
- EasySploit - Metasploit automation (EASIER and FASTER than EVER)☆373Updated 5 years ago
- 🎯 HackerTarget ToolKit - Tools And Network Intelligence To Help Organizations With Attack Surface Discovery 🎯☆498Updated last year
- Hakku Framework penetration testing☆327Updated 3 years ago
- Multiplatform payload dropper☆264Updated 3 years ago
- Linux bash script automation for metasploit☆260Updated 5 years ago
- Hacking systems with the automation of PasteJacking attacks.☆393Updated 4 months ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆732Updated 4 years ago
- XCTR Hacking Tools☆38Updated 3 years ago
- PhEmail is a python open source phishing email tool that automates the process of sending phishing emails as part of a social engineering…☆335Updated 5 years ago
- Optiva-Framework 🔎 Web Application Scanner🕵️☆302Updated 4 years ago
- All things to do after installing Kali Linux and Add more awesome hacking tools to your Kali Linux system☆478Updated 4 years ago
- An advanced multithreaded admin panel finder written in python.☆770Updated 9 months ago
- Auto Scanning to SSL Vulnerability☆630Updated 4 years ago
- A Phishing Dropper designed to Pentest.☆270Updated 7 years ago
- Inject malicious code into *.debs☆271Updated 2 years ago
- network reconnaissance toolkit☆421Updated 6 years ago
- CMS auto detect and exploit.☆389Updated 2 years ago
- Androspy framework is a Backdoor Crypter & Creator with Automatic IP Poisener☆252Updated 6 years ago
- Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).☆609Updated 2 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆361Updated 7 years ago
- Terminator metasploit payload generator☆177Updated 6 years ago
- A friend of SQLmap which will do what you always expected from SQLmap.☆437Updated 5 years ago
- information gathering via dorks☆382Updated 2 years ago
- HackBox is a powerful and comprehensive tool that combines a variety of techniques for web application and network security assessments, …☆394Updated 2 years ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆909Updated 5 years ago
- This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.☆339Updated 7 years ago
- IP Tools To quickly get information about IP Address's, Web Pages and DNS records.☆485Updated 4 years ago