SubnetWizard is a Python Based CLI tools for subnet calculating
☆52Apr 4, 2024Updated last year
Alternatives and similar repositories for SubnetWizard
Users that are interested in SubnetWizard are comparing it to the libraries listed below
Sorting:
- log Forenix 🕵️- Your Linux Forensic Artifacts Collector Tool! 🚀☆30Jun 18, 2024Updated last year
- EncryptXpert is an app for easy file encryption/decryption using AES-EAX or AES-GCM algorithms. With GUI & CLI support and Build-in Key D…☆58Apr 1, 2024Updated last year
- Herramienta completa de Scrapping en la Deep Web☆17Jul 24, 2025Updated 7 months ago
- This repository holds some very beginner projects that I worked on related to cybersecurity.☆23Sep 23, 2024Updated last year
- PDFs of awesome cybersecurity info☆24Jan 19, 2026Updated last month
- Site-Scanner - Web application vulnerability assessment tool.☆50Jul 30, 2024Updated last year
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆69Jul 25, 2023Updated 2 years ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- This is a program written in python which allows you to log in with different sql injections that allow you to bypass some login pages (F…☆12Feb 23, 2023Updated 3 years ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- This project is about tool for detecting, quarantining, and alerting about suspicious phishing emails.☆17Aug 29, 2025Updated 6 months ago
- ☆26Dec 15, 2023Updated 2 years ago
- ☆12Nov 18, 2020Updated 5 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Fast exploitation based on metasploit.☆74Dec 28, 2019Updated 6 years ago
- ☆14May 14, 2022Updated 3 years ago
- ☆12Updated this week
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 5 months ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 7 months ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- ☆10Dec 19, 2023Updated 2 years ago
- Project that creates a Kubernetes environment in Azure (AKS) and protects it with CloudGuard CSPM / Workload and Appsec technologies☆10Jun 12, 2023Updated 2 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- Android pin cracker☆13Mar 25, 2022Updated 3 years ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆43Jun 30, 2024Updated last year
- A Hackers framework☆166Nov 2, 2017Updated 8 years ago
- ☆42Dec 24, 2024Updated last year
- Obtain a Phone Number full profile including HLR, Reputation, Carrier, Social Media Accounts, Geolocation, Validation, Availabilty, Porta…☆273Nov 25, 2023Updated 2 years ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆177Jun 10, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- ☆10May 6, 2017Updated 8 years ago
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆24Jan 19, 2026Updated last month
- A fast pure-Python search engine☆12Apr 9, 2009Updated 16 years ago