Cyber Security
☆22Mar 4, 2023Updated 2 years ago
Alternatives and similar repositories for pentesting
Users that are interested in pentesting are comparing it to the libraries listed below
Sorting:
- ☆31May 22, 2024Updated last year
- Reverse Shell for Android☆24Apr 12, 2014Updated 11 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is abl…☆17Jul 9, 2020Updated 5 years ago
- AMC (Automatic Media Access Control [MAC] Address Spoofing tool), Helps you to protect your real network hardware identity. Each entered …☆22Nov 22, 2024Updated last year
- ☆10Dec 3, 2021Updated 4 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- st2 salt integration pack☆13Apr 7, 2024Updated last year
- ☆10Mar 13, 2020Updated 5 years ago
- REBASE token contracts☆12Mar 1, 2021Updated 4 years ago
- SSH brute-forcing tool written in python☆15Feb 10, 2023Updated 3 years ago
- USB rubber ducky reverse shell with disabling windows defender☆12Apr 17, 2021Updated 4 years ago
- Redefining Web Operating Systems☆18Sep 22, 2025Updated 5 months ago
- A client interface for the Citybikes API https://api.citybik.es☆11Aug 21, 2025Updated 6 months ago
- Multi-threaded port scanner written in C++☆13Dec 17, 2019Updated 6 years ago
- Exploiting Android devices☆10Sep 12, 2022Updated 3 years ago
- A simple Arduino Library to send message on Discord using webhook☆14Feb 25, 2025Updated last year
- Script Open Source Facebook Crack Indonesia👾💥☆12Jan 6, 2024Updated 2 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- ☆15Apr 20, 2023Updated 2 years ago
- Step by step implementation of FRI☆13Feb 9, 2025Updated last year
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago
- A load generator for Salt☆14Mar 2, 2022Updated 3 years ago
- 🌈 Render PowerShell in the Terminal with Syntax Highlighting☆10May 25, 2023Updated 2 years ago
- Here are some of ethical hacking tools and scripts in python.☆11Dec 11, 2021Updated 4 years ago
- Public Audits in the NEAR Ecosystem☆14Jun 10, 2024Updated last year
- ☆11Mar 18, 2024Updated last year
- ✨ Un code qui permet de Token Grab en Python par moi, et en français.☆11Jun 8, 2021Updated 4 years ago
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆12Mar 6, 2023Updated 2 years ago
- Scripts and Tips for Kali Linux Pi-Tail Edition☆11Dec 8, 2023Updated 2 years ago
- Create graphed invoice for Google Cloud Platform. You can see billing amount per GCP project.☆11Feb 28, 2022Updated 4 years ago
- This project uses an ESP32-Cam connected to a motion sensor. When the motion sensor is activated, a photo will be submitted to the desire…☆11Sep 4, 2021Updated 4 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- Smart contracts of the Ultimate Synthetic Delta Neutral☆11Jan 26, 2026Updated last month
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- ☆11Feb 3, 2026Updated 3 weeks ago
- PSScanner is made for IT administrators to scan corporate network, showing IP address, hostname, current logon user and serialnumber for …☆11Dec 29, 2023Updated 2 years ago