rajeshmajumdar / PloitKitLinks
The Hacker's ToolBox
☆189Updated 8 years ago
Alternatives and similar repositories for PloitKit
Users that are interested in PloitKit are comparing it to the libraries listed below
Sorting:
- Advanced Hash Manipulation☆176Updated 5 years ago
- Chat with hacker assistant☆196Updated 7 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆222Updated 4 years ago
- Passive Vulnerability Auditor☆134Updated 9 years ago
- War Child denial of service testing suite☆123Updated 8 years ago
- Phishing on Twitter☆256Updated 7 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Updated 6 years ago
- Poison, reset, spoof, redirect MITM script☆128Updated 2 years ago
- This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. This…☆290Updated 7 years ago
- NoobSecToolkit is a Python Based Tool kit that brings together powerful security and anonymity tools and scripts with predefined security…☆114Updated last year
- Tools that are related to pentest and network security☆97Updated 4 years ago
- Tool for breaking into web applications.☆92Updated 6 years ago
- hacklib - pentesting, port scanning, and logging in anywhere with Python☆97Updated 6 years ago
- Social engineering tool for human hacking☆122Updated 8 years ago
- Mass exploitation tool in python☆205Updated 6 years ago
- Exploits and Security Tools Framework 2.0.1☆306Updated 3 years ago
- Exploit pack for pentesters and ethical hackers.☆116Updated 8 years ago
- A web interface to automate Scanning, Generating metasploit payload, Network Testing,Exploring CMS,Information Gathering and much more☆169Updated 10 years ago
- Tool to automatic leak information using Hacking with engine searches☆92Updated 7 years ago
- search for hosts info with shodan☆232Updated 4 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆141Updated 7 years ago
- A unified console to perform the "kill chain" stages of attacks.☆205Updated 2 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆190Updated 6 years ago
- Automates some pentest jobs via nmap xml file☆324Updated 7 years ago
- Tulpar - Web Vulnerability Scanner☆203Updated 5 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆116Updated 5 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 8 years ago
- Git all your favorite tools in one click☆269Updated 3 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆73Updated 5 years ago
- ☆195Updated 7 years ago