sensity-ai / dotLinks
The Deepfake Offensive Toolkit
☆4,477Updated last year
Alternatives and similar repositories for dot
Users that are interested in dot are comparing it to the libraries listed below
Sorting:
- Browser In The Browser (BITB) Templates☆2,875Updated last year
- TUI-based toolkit for GitHub data analysis.☆1,882Updated 2 weeks ago
- Never ever ever use pixelation as a redaction technique☆8,188Updated last year
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,187Updated 3 months ago
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.☆3,161Updated last year
- Ready to go Phishing Platform☆1,092Updated 8 months ago
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,122Updated 2 years ago
- Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.☆3,658Updated 8 months ago
- An open-source digital image forensic toolset☆3,083Updated 6 months ago
- Open-source tool to bypass windows and linux passwords from bootable usb☆1,964Updated 2 years ago
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,256Updated 6 months ago
- GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without l…☆1,547Updated 3 weeks ago
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.☆1,037Updated this week
- Store files as YouTube videos == infinite disk space☆1,935Updated 7 years ago
- Bumble's Private Detector - a pretrained model for detecting lewd images☆1,340Updated 2 years ago
- Simple C++ Image Steganography tool to encrypt and hide files inside images using Least-Significant-Bit encoding.☆1,055Updated last year
- Tunneling Internet traffic over Whatsapp☆3,129Updated 3 years ago
- A Stable Diffusion desktop frontend with inpainting, img2img and more!☆1,275Updated 2 years ago
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,727Updated 4 years ago
- A curated list of useful resources that cover Offensive AI.☆1,327Updated 2 weeks ago
- HiddenVM — Use any desktop OS without leaving a trace.☆2,633Updated last year
- a drop-in replacement for Nmap powered by shodan.io☆3,160Updated 8 months ago
- min(DALL·E) is a fast, minimal port of DALL·E Mini to PyTorch☆3,493Updated 8 months ago
- Automagically reverse-engineer REST APIs via capturing traffic☆9,203Updated last month
- Wi-Fi Exploitation Framework☆2,747Updated 3 months ago
- ☆1,540Updated 2 years ago
- a file-sharing tool that allows you to find the responsible person in case of a leakage☆1,102Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,581Updated 2 months ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,737Updated 2 years ago
- OOXML password remover☆596Updated 3 years ago