The Deepfake Offensive Toolkit
β4,553Jun 14, 2024Updated last year
Alternatives and similar repositories for dot
Users that are interested in dot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Real-time face swap for PC streaming or video callsβ30,836Nov 8, 2024Updated last year
- The recursive internet scanner for hackers. π§‘β9,700Updated this week
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniβ¦β1,389Oct 27, 2023Updated 2 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.β1,281Apr 23, 2026Updated 3 weeks ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β15,080Oct 6, 2025Updated 7 months ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The Token Stealerβ521Jul 13, 2022Updated 3 years ago
- Automagically reverse-engineer REST APIs via capturing trafficβ9,482Updated this week
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,947Oct 7, 2023Updated 2 years ago
- Spoofing desktop login applications with WinForms and WPFβ179Feb 19, 2024Updated 2 years ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ7,133Mar 12, 2024Updated 2 years ago
- π΅οΈββοΈ Offensive Google framework.β18,947Apr 10, 2026Updated last month
- Analyse your malware to surgically obfuscate itβ530Dec 17, 2025Updated 5 months ago
- The Havoc Frameworkβ8,361Dec 18, 2025Updated 5 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.β1,199Oct 16, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- π΅οΈββοΈ Collect a dossier on a person by username from 3000+ sitesβ28,870May 15, 2026Updated last week
- Never ever ever use pixelation as a redaction techniqueβ8,303Mar 15, 2024Updated 2 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRsβ1,234Aug 18, 2023Updated 2 years ago
- it is very goodβ516Dec 20, 2022Updated 3 years ago
- Ready to go Phishing Platformβ1,137May 6, 2025Updated last year
- EDR Lab for Experimentation Purposesβ1,452Mar 1, 2026Updated 2 months ago
- Gather and update all available and newest CVEs with their PoC.β7,762May 14, 2026Updated last week
- Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.β3,782Jan 26, 2026Updated 3 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.β794Jan 9, 2025Updated last year
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An arbitrary face-swapping framework on images and videos with one single trained model!β5,174Aug 6, 2024Updated last year
- βοΈπ€« Stealth redirector for your red team operation securityβ1,079Mar 1, 2026Updated 2 months ago
- Find, verify, and analyze leaked credentialsβ26,446Updated this week
- DeepFaceLab is the leading software for creating deepfakes.β19,200Nov 13, 2024Updated last year
- A next-generation crawling and spidering framework.β16,701May 11, 2026Updated last week
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methodsβ1,472Aug 18, 2023Updated 2 years ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounβ¦β10,631Updated this week
- This map lists the essential techniques to bypass anti-virus and EDRβ3,261Mar 28, 2025Updated last year
- π Generate malicious PDF test files for testing phone-home callbacks, SSRF, XSS, NTLM credential theft, and data exfiltration in PDF vieβ¦β3,702Apr 20, 2026Updated last month
- Bare Metal GPUs on DigitalOcean Gradient AI β’ AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accountsβ1,388Mar 9, 2026Updated 2 months ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rulesβ¦β6,005Jul 12, 2024Updated last year
- Send phishing messages and attachments to Microsoft Teams usersβ1,112Jun 19, 2024Updated last year
- Rust Weaponization for Red Team Engagements.β3,007Apr 25, 2024Updated 2 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.β2,252Apr 24, 2026Updated 3 weeks ago
- Browser In The Browser (BITB) Templatesβ2,890Jan 26, 2024Updated 2 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations