mytechnotalent / turbo-attack
A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numbers to a particular IP and port.
☆141Updated last month
Alternatives and similar repositories for turbo-attack:
Users that are interested in turbo-attack are comparing it to the libraries listed below
- A port scanner and service detection tool that uses 1000 goroutines at once to scan any hosts IP or FQDN with the sole purpose of testing…☆155Updated last month
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆40Updated 2 years ago
- An Encrypted File transfer via AES-256-CBC☆49Updated 4 years ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆60Updated 3 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆63Updated 3 years ago
- Pentest/Red Team: Resources, repos and scripts.☆68Updated last week
- Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is int…☆47Updated last year
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆71Updated 3 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆102Updated last year
- Sifter - All purpose penetration testing op-center☆74Updated 2 years ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆91Updated last year
- An OSINT focused tool made with Nodejs!☆92Updated 2 years ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆68Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆97Updated 5 months ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆39Updated 2 years ago
- ☆27Updated 2 years ago
- PassDetective is a command-line tool that scans shell command history to detect mistakenly written passwords, API keys, and secrets. Usin…☆129Updated 10 months ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆102Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 2 years ago
- DASH is deep osint Scanner. You just need username to start osint scan.☆48Updated 2 years ago
- Full Valid Fake Data Generator☆98Updated 6 months ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆66Updated 2 weeks ago
- Windows Hacking FrameWork using Reverse Shell☆105Updated last month
- A reverse TCP payload and listener both written in python3.☆30Updated 10 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆69Updated 2 years ago
- C2 server to connect to a victim machine via reverse shell☆54Updated 3 years ago
- Check IP addresses against known cloud provider IP address ranges☆44Updated last year