pentestfunctions / extractfacesfromyoutube
Extracts faces from youtube videos
☆13Updated last year
Related projects ⓘ
Alternatives and complementary repositories for extractfacesfromyoutube
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆38Updated 3 years ago
- Scripts for offensive security☆79Updated 3 months ago
- Bookmarklet to find endpoints easily with one click☆42Updated 6 months ago
- capNcook - a dark web exploration tool☆55Updated 7 months ago
- What the name says....☆86Updated 2 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆119Updated 2 months ago
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆39Updated 3 months ago
- Automate installation of extra pentest tools on Kali Linux☆44Updated 3 years ago
- Random OSINT idea tool thing☆14Updated 11 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆124Updated 4 months ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆51Updated 2 months ago
- Quick commands for pentesting/No typing!☆13Updated last year
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆54Updated last month
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆69Updated 2 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆92Updated 10 months ago
- notes and ramblings from my OSCP/PenTesting Studies☆68Updated last year
- ☆53Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆139Updated 5 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆235Updated 2 months ago
- My personal pretesting recon/low hanging fruit script. Uses Gxss, Dalfox, and a few other scripts to scan all of a domain(and/or subdomai…☆20Updated 3 weeks ago
- Remake of CVE-2020-9484 by Pentestical☆16Updated 2 months ago
- A Powerful Intruder written in Python☆8Updated 3 years ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆29Updated 4 months ago
- 🤖 The Modern Port Scanner 🤖☆15Updated 3 years ago
- Monta tu laboratorio para preparar la certificación eCPPT☆17Updated last year
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆41Updated last year
- This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220☆22Updated 3 months ago
- Automation tool to testing and confirm the xss vulnerability.☆127Updated this week
- This is a simple bash script to fix errors with apt update, upgrade MetaSploit and run some upgrades to improve the system usability with…☆99Updated 3 months ago