sensity-ai / dot
The Deepfake Offensive Toolkit
☆4,197Updated 7 months ago
Alternatives and similar repositories for dot:
Users that are interested in dot are comparing it to the libraries listed below
- GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without l…☆1,386Updated 8 months ago
- Real-time face swap for PC streaming or video calls☆27,400Updated 2 months ago
- Extract files from any kind of container formats☆2,254Updated this week
- Ready to go Phishing Platform☆899Updated 5 months ago
- a drop-in replacement for Nmap powered by shodan.io☆2,947Updated 9 months ago
- OFRAK: unpack, modify, and repack binaries.☆1,897Updated this week
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,497Updated this week
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,052Updated 2 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,373Updated 2 years ago
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆1,991Updated last week
- apk.sh makes reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding, rebuilding and patching an…☆3,390Updated 5 months ago
- Wi-Fi Exploitation Framework☆2,447Updated 4 months ago
- An OSINT tool to search for accounts by username and email in social networks.☆3,010Updated last month
- A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities …☆2,023Updated 7 months ago
- The Panthera(P.)uncia of Cybersecurity - Official CLI utility for Osprey Vision, Subdomain Center & Exploit Observer.☆645Updated this week
- Gather and update all available and newest CVEs with their PoC.☆6,693Updated this week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11,832Updated 4 months ago
- A collection of several hundred online tools for OSINT☆5,716Updated 5 months ago
- Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickn…☆10,051Updated 6 months ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,085Updated 4 years ago
- Modlishka. Reverse Proxy.☆4,893Updated 8 months ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,006Updated 5 months ago
- HiddenVM — Use any desktop OS without leaving a trace.☆2,386Updated 5 months ago
- Browser In The Browser (BITB) Templates☆2,785Updated 11 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆2,916Updated 2 weeks ago
- An extensible, easy-to-use, and portable diffusion web UI 👨🎨☆1,669Updated last year
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,141Updated last month
- An Open-source LTE Downlink/Uplink Eavesdropper☆1,832Updated 2 months ago
- An open-source digital image forensic toolset☆2,738Updated 2 months ago