thc-ipv6 debian package (part of https://salsa.debian.org/pkg-security-team/thc-ipv6 as of 201607)
☆34Aug 3, 2017Updated 8 years ago
Alternatives and similar repositories for pkg-thc-ipv6
Users that are interested in pkg-thc-ipv6 are comparing it to the libraries listed below
Sorting:
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- A software having all stuff related to proxy☆10Feb 12, 2023Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Dec 8, 2021Updated 4 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- Tool for dictionary attack with fail2ban bypass.☆10May 17, 2018Updated 7 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Jan 6, 2022Updated 4 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Apr 5, 2022Updated 3 years ago
- PowerShell wrapper for nmap, allows easy scanning of many hosts and subnets☆15Apr 1, 2018Updated 7 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- Black Hat Ethical Hacking - Official Theme for Conky Manager☆18Sep 6, 2024Updated last year
- Who We Are☆22Sep 6, 2024Updated last year
- A tool to abuse Exchange services☆18Jun 21, 2019Updated 6 years ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- PowerShell Pass The Hash Utils☆16Dec 9, 2018Updated 7 years ago
- Files compiled from the Logica breach investigation materials☆45Aug 14, 2018Updated 7 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Nov 10, 2019Updated 6 years ago
- Cross platform (i.e., Windows, Linux, Mac) assessment script. The script helps assess workstations for vulnerabilities and abnormalities.☆19Aug 14, 2015Updated 10 years ago
- An automated e-mail OSINT tool☆23Apr 23, 2022Updated 3 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- ☆24Jan 31, 2016Updated 10 years ago
- Automatic attack detector and botnet classifier☆28Jan 10, 2017Updated 9 years ago
- intrusion detection☆26Jun 14, 2017Updated 8 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30May 7, 2024Updated last year
- VirtualBox Disk Image Encryption password cracker☆31Oct 6, 2015Updated 10 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last month
- Python wrapper for the Mitre ATT&CK framework API☆31Mar 12, 2018Updated 7 years ago
- This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save t…☆26Sep 6, 2024Updated last year
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Subdomain Bruteforce - Bounty Quick Code☆31Sep 6, 2024Updated last year
- Security Research☆36Dec 23, 2021Updated 4 years ago
- Android Connections Forensics☆33Dec 15, 2015Updated 10 years ago
- stuff to generate the pentoo livecd☆24Jul 2, 2024Updated last year
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago