nsgodshall / HatchLinks
Adds ability to successfully login into websites that have a delay after login and adds directory of chromedriver, this fork was used in the Null Byte tutorial for Hatch.
☆156Updated 3 years ago
Alternatives and similar repositories for Hatch
Users that are interested in Hatch are comparing it to the libraries listed below
Sorting:
- A simple script to generate a hidden url for social engineering.☆122Updated 5 years ago
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scrip…☆163Updated last year
- Control remote computers using discord bot and python 3.☆182Updated 3 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆123Updated last year
- Quasar : An Information Gathering Framework For Lazy Penetration Testers☆162Updated 4 years ago
- Let's find someone's account☆165Updated 6 years ago
- Python tool for phishing☆244Updated last year
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆156Updated 2 weeks ago
- GUI based offensive penetration testing tool (Open Source)☆220Updated 3 months ago
- Gloom-Framework :: Linux Penetration Testing Framework☆53Updated 8 years ago
- Create awesome wordlist with python, demo: https://asciinema.org/a/101677☆123Updated 6 years ago
- Multiplatform payload dropper☆275Updated 4 years ago
- ☆179Updated 2 years ago
- Detect evil urls that uses IDN Homograph Attack.☆204Updated 7 years ago
- Community-built scenarios for Wifiphisher☆370Updated 4 years ago
- Simple Backdoor Manager with Python (based on weevely)☆96Updated 8 months ago
- Blazing fast admin panel finder with asyncio and aiohttp☆220Updated 3 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆54Updated 4 years ago
- Using Social Engineering To Obtain WiFi Passwords☆102Updated 7 years ago
- Userspace remote keylogger for Linux, works with X, logs key stikes to a file and sends report by email.☆147Updated last year
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆141Updated 5 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆63Updated 5 years ago
- Hacking systems with the automation of PasteJacking attacks.☆401Updated last year
- Git all your favorite tools in one click☆269Updated 3 years ago
- Ultimate Recon Software for Information Gathering☆98Updated 5 years ago
- v1ew-s0urce a recon tool built by the 5/9Dark team.☆92Updated 4 years ago
- WinSpy a Windows reverse shell Backdoor creator with an Automatic IP Poisener☆209Updated 7 years ago
- Tools for information gathering☆352Updated last year
- DMitry (Deepmagic Information Gathering Tool)☆232Updated last month
- A python script designed to check if the website if vulnerable of clickjacking and create a poc☆152Updated 5 years ago