ppfeister / sylva
Simplify the link between social and real identities
β10Updated 6 months ago
Alternatives and similar repositories for sylva:
Users that are interested in sylva are comparing it to the libraries listed below
- Automate your C2 creation with Azure Frontdoor and randomly generated optionsβ13Updated 5 months ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion π·β72Updated 2 weeks ago
- SOCMINT tool to find social media accounts.β23Updated 6 months ago
- Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!β16Updated 8 months ago
- This tool uses the GitHub API to scan repositories owned by a user for email addresses and associated names. It provides options to scan β¦β24Updated 2 months ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is doneβ¦β16Updated 7 months ago
- β9Updated 2 weeks ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in aβ¦β103Updated 8 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cliβ¦β75Updated 5 months ago
- Auto exploitation tool for CVE-2024-24401.β32Updated 6 months ago
- π Advanced Rat controllable by a telegram bot with many commands and functions.β13Updated 8 months ago
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.β40Updated 8 months ago
- All-sources tool to search websites by faviconsβ119Updated 4 months ago
- π€ The Modern, Blazing Fast Port Scanner π€β28Updated 2 months ago
- Social Engineering Browser Update Attack.β55Updated last year
- A script to automate keystrokes through a graphical desktop program.β34Updated last month
- Fast and customizable Firebase api and Project ID extractor .β18Updated last year
- NetScan CLI is a command-line tool for retrieving and analyzing IP address information. It provides detailed subnet and organization dataβ¦β57Updated 6 months ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) oβ¦β85Updated 7 months ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBoxβ18Updated 2 years ago
- Hacker calendar 2024 in high resolution + template + some editing tipsβ22Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate dataβ54Updated last year
- Operation Archive - Saving the history behind Cybercriminal Arrests, Documentation, Raids, Seizures, and more!β40Updated last month
- A TikTok - Live Watcher application for tty / cli - for the unlikely situation when you live in tty, but want to watch TikTok Live.β26Updated 6 months ago
- Tool for bypassing logins vulnerable against SQL injectionβ44Updated 11 months ago
- hashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate aβ¦β45Updated 3 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.β70Updated last month