mytechnotalent / turbo-attack
A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numbers to a particular IP and port.
☆136Updated 6 months ago
Alternatives and similar repositories for turbo-attack:
Users that are interested in turbo-attack are comparing it to the libraries listed below
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆57Updated 3 years ago
- A port scanner and service detection tool that uses 1000 goroutines at once to scan any hosts IP or FQDN with the sole purpose of testing…☆150Updated 6 months ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆36Updated last year
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆62Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆65Updated last year
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆100Updated last year
- Crawls URL to get a better image of what is tied to a website.☆32Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆94Updated 2 months ago
- [EN] BETA: Layla - recon tool for bug bounty☆76Updated 2 years ago
- PassDetective is a command-line tool that scans shell command history to detect mistakenly written passwords, API keys, and secrets. Usin…☆122Updated 7 months ago
- C2 server to connect to a victim machine via reverse shell☆51Updated 2 years ago
- An Encrypted File transfer via AES-256-CBC☆43Updated 3 years ago
- Helping you delete your old accounts☆85Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆72Updated 4 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆122Updated 2 years ago
- ☆27Updated 2 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆45Updated last year
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆180Updated last year
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆171Updated 2 years ago
- Web Path Finder☆60Updated last year
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆60Updated 3 years ago
- Sifter - All purpose penetration testing op-center☆75Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆52Updated 2 years ago
- A proof of concept email spoofing tool built on Docker.☆120Updated 3 years ago
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and …☆38Updated last year
- Pentesting Tools to Automatize Active Directory Hacking☆16Updated 2 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆114Updated 7 months ago