r0jahsm0ntar1 / africana-framework
Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability assessment. It automates the detection of security flaws across a wide range of network and web technologies, including all networks, system anonymity, & web bug hunting. It's purely written for Good and not Evil.
☆33Updated this week
Alternatives and similar repositories for africana-framework
Users that are interested in africana-framework are comparing it to the libraries listed below
Sorting:
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆44Updated 9 months ago
- POC | Steal user WhatsApp information/data☆54Updated this week
- Hacking with PasteJacking technique☆22Updated 10 months ago
- Here are +200 different rats some with source code☆95Updated last year
- Nmap & SQL injection automation tool☆34Updated 7 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆130Updated 2 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆105Updated last year
- This is a exploit with the capability to control ip camera movement even without a username and password.☆59Updated last month
- 🔮 Python Remote administration tool via telegram☆49Updated 3 weeks ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆34Updated 10 months ago
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆81Updated 3 weeks ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- A social engineering toolkit for performing smishing, and other sms attacks☆85Updated 10 months ago
- Clipboard poisoning attack.☆56Updated 4 years ago
- Redirect All Traffic Through Tor Network For Kali Linux☆187Updated last month
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- Social Engineering Browser Update Attack.☆56Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆39Updated 8 months ago
- GENERATE PYTHON BASED FUD STUB☆19Updated last year
- A tool for automatically change the Tor IP address over time.☆86Updated last month
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆69Updated 2 years ago
- ☆21Updated 2 years ago
- Offensive Powershell obfuscator☆27Updated 8 months ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆32Updated 2 years ago
- DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others T…☆145Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- steal chrome saved passwords "undetectable"☆50Updated 3 years ago
- This Discord Rat give you the best way to control victims pc on discord.☆15Updated 4 months ago