mr-r3b00t / cyberwarLinks
☆11Updated 2 years ago
Alternatives and similar repositories for cyberwar
Users that are interested in cyberwar are comparing it to the libraries listed below
Sorting:
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆25Updated 4 years ago
- Pentest/Red Team: Resources, repos and scripts.☆72Updated last month
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆44Updated 3 years ago
- Files and Programs for UAV and Drone Cybersecurity Workshop☆34Updated last year
- ☆26Updated last month
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- Low-cost WarShipping with built-in geofencing, WiFi recon, and Rogue AP on the ESP8266☆46Updated 2 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆33Updated 5 months ago
- Discord bot for the Shodan API - OSINT tool☆78Updated last year
- Python3 script to dump breach data from Dehashed☆32Updated last month
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆90Updated last year
- Detect Stalkers with Wardriving, using Python☆39Updated 2 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Internal Network Penetration Test Playbook☆21Updated 4 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- 📡 🍍Detects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection…☆38Updated 3 years ago
- A simple CLI tool for detecting breached emails and corresponding passwords.☆17Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- Collection of extra pentest tools for Kali Linux☆109Updated 2 years ago
- Simple Tool for webhacking☆11Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆70Updated last year
- Facial Recognition and its dangers for Special Forces Operatives☆24Updated last year
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆46Updated 5 months ago
- Maltego Transforms for WhatsMyName☆68Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- Extendable Python script handler for automating penetration testing.☆39Updated 2 years ago
- Crack passwords with Hashcat using a Discord Bot.☆26Updated last year
- Meteorology reports and forecasts, satellite pass predictions, communications decoding, and imagery analysis for NOAA satellites 🌧 🛰 📡☆18Updated 2 years ago