Web of trust grapher
☆40Feb 25, 2026Updated last week
Alternatives and similar repositories for wotmate
Users that are interested in wotmate are comparing it to the libraries listed below
Sorting:
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- rev shell and manager in go☆20Feb 25, 2020Updated 6 years ago
- Starts an ngrok TCP tunnel and notifies you of the URL. Perfect for automated remote SSH connections.☆14Jan 24, 2021Updated 5 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Mar 22, 2019Updated 6 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆38Aug 17, 2022Updated 3 years ago
- tundeep☆42Aug 2, 2019Updated 6 years ago
- Multi theaded DNS bruteforcing☆13May 7, 2014Updated 11 years ago
- VBA Reversed TCP Meterpreter Stager☆65Apr 23, 2018Updated 7 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Identity DAO, a new decentralized solution to verifying humans.☆15Mar 14, 2020Updated 5 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Feb 12, 2021Updated 5 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39May 23, 2019Updated 6 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Jun 22, 2018Updated 7 years ago
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 4 months ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- ExeScan is the FREE console based tool to detect anomalies in PE (Portable Executable) files. It quickly scans given executable file and …☆21Dec 14, 2018Updated 7 years ago
- Basics of Windows privilege escalation☆134Sep 30, 2017Updated 8 years ago
- Phishing on Twitter☆251Jun 21, 2018Updated 7 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Jun 2, 2018Updated 7 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Bash Bunny fun!☆53May 24, 2018Updated 7 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Created by Jeffrey Martin via the GitHub Connector☆50Feb 13, 2025Updated last year
- A Pythonic wrapper to MassDNS☆24Mar 21, 2018Updated 7 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆28Aug 9, 2018Updated 7 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago