sensity-ai / dotLinks
The Deepfake Offensive Toolkit
☆4,475Updated last year
Alternatives and similar repositories for dot
Users that are interested in dot are comparing it to the libraries listed below
Sorting:
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.☆3,157Updated last year
- Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.☆3,649Updated 7 months ago
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,240Updated 6 months ago
- Extract files from any kind of container formats☆2,411Updated last week
- Wi-Fi Exploitation Framework☆2,639Updated 3 months ago
- An open-source digital image forensic toolset☆3,066Updated 5 months ago
- Open-source tool to bypass windows and linux passwords from bootable usb☆1,964Updated 2 years ago
- The RF and reverse engineering framework for everyone. Follow and ★ to show your support!☆1,855Updated last week
- Tunneling Internet traffic over Whatsapp☆3,114Updated 3 years ago
- GitHub Data Analysis Framework.☆1,874Updated last year
- A OSINT tool to obtain a target's phone number just by having his email address☆2,555Updated last year
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,727Updated 4 years ago
- An OSINT tool to search for accounts by username and email in social networks.☆5,109Updated 5 months ago
- Browser extension to spoof timezone, geolocation, locale and user agent.☆1,965Updated last year
- The web scraping open project repository aims to share knowledge and experiences about web scraping with Python☆1,690Updated last year
- An Open-source LTE Downlink/Uplink Eavesdropper☆2,084Updated last year
- A collection of several hundred online tools for OSINT☆7,314Updated 5 months ago
- Quickly Extracts IP's, Email Addresses, Hashes, Files, Credit Cards, Social Security Numbers and a lot More From Text☆875Updated last year
- a file-sharing tool that allows you to find the responsible person in case of a leakage☆1,100Updated 3 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,183Updated 2 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,472Updated 3 years ago
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.☆1,038Updated 3 weeks ago
- A curated list of useful resources that cover Offensive AI.☆1,314Updated 2 weeks ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,621Updated last week
- Collections of tools and methods created to aid in OSINT collection☆3,317Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,560Updated last month
- Automagically reverse-engineer REST APIs via capturing traffic☆9,190Updated 2 weeks ago
- List of API's for gathering information about phone numbers, addresses, domains etc☆2,145Updated 7 months ago
- Ready to go Phishing Platform☆1,082Updated 7 months ago
- HiddenVM — Use any desktop OS without leaving a trace.☆2,627Updated last year