mytechnotalent / turbo-attackLinks
A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numbers to a particular IP and port.
☆151Updated 4 months ago
Alternatives and similar repositories for turbo-attack
Users that are interested in turbo-attack are comparing it to the libraries listed below
Sorting:
- A port scanner and service detection tool that uses 1000 goroutines at once to scan any hosts IP or FQDN with the sole purpose of testing…☆156Updated 4 months ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆104Updated last year
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆62Updated 3 years ago
- PassDetective is a command-line tool that scans shell command history to detect mistakenly written passwords, API keys, and secrets. Usin…☆130Updated last year
- Interactive shell to execute commands anonymously using Proxychains and Tor☆42Updated 2 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆42Updated 2 years ago
- Multi-threaded CMS BruteForcer to WordPress, Joomla, Drupal, OpenCart☆44Updated 7 years ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆98Updated 8 months ago
- Hacking Methodology, Cheatsheats, Conceptual-Breakdowns☆72Updated last month
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 4 years ago
- A certificate transparency log keyword sniffer written in python☆84Updated 2 years ago
- Pentest/Red Team: Resources, repos and scripts.☆71Updated 2 weeks ago
- Crawls URL to get a better image of what is tied to a website.☆33Updated 2 years ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆99Updated last year
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆77Updated last year
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆58Updated 2 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated 10 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆68Updated 3 months ago
- An forensics tool to help aid in the investigation of spoofed emails based off the email headers.☆170Updated 4 years ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- Full Valid Fake Data Generator☆99Updated 9 months ago
- Social Engineering Browser Update Attack.☆56Updated last year
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆191Updated 2 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆117Updated last year
- Fetching passwords from the chrome browser database☆91Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆135Updated 3 years ago
- 🕵️ OSINT Tool (github tracker)☆140Updated last year
- Extendable Python script handler for automating penetration testing.☆39Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆63Updated 2 years ago