medpaf / hawkLinks
Network, recon and offensive-security tool for Linux.
☆303Updated last year
Alternatives and similar repositories for hawk
Users that are interested in hawk are comparing it to the libraries listed below
Sorting:
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆191Updated 2 years ago
- Update Version 3.1 added free SMS messaging.☆483Updated 3 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆237Updated 11 months ago
- Automated rogue access point setup tool.☆197Updated 4 years ago
- PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.☆128Updated last year
- Modular personalized dictionary generator.☆209Updated 11 months ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆88Updated 9 months ago
- Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3…☆305Updated 2 years ago
- Kraken: A multi-platform distributed brute-force password cracking system☆318Updated 2 years ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆394Updated 3 years ago
- A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generati…☆292Updated 3 years ago
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆254Updated 3 years ago
- Username enumeration & reconnaisance suite☆175Updated 3 years ago
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆126Updated last month
- Tool Information Gathering & social engineering Write By [Python,JS,PHP]☆510Updated last year
- OSINT Framework : A python based Open Source Intelligence CLI framework similar to Metasploit.☆175Updated 3 weeks ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆402Updated last year
- Turn PuTTY into an SSH login bruteforcing tool.☆285Updated 4 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- RomBuster is a router exploitation tool that allows to disclosure network router admin password.☆515Updated 11 months ago
- DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets☆237Updated 3 years ago
- [EN] BETA: Layla - recon tool for bug bounty☆76Updated 3 years ago
- GUI Osint Framework with Kali Linux☆154Updated 2 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆370Updated 2 years ago
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆401Updated 2 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆133Updated last year
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆234Updated last year
- A Zphisher GUI Back-Office Plugin☆218Updated last year
- Hide your payload into .jpg file☆395Updated 3 years ago
- Stego is an open-source and free steganography tool that lets you hide your secret message in an image or audio file. You will not notice…☆146Updated 3 years ago