sensity-ai / dot
The Deepfake Offensive Toolkit
☆4,315Updated 11 months ago
Alternatives and similar repositories for dot
Users that are interested in dot are comparing it to the libraries listed below
Sorting:
- Convert RGB value to ImVec3 for ImGui.☆1Updated 3 years ago
- A collection of several hundred online tools for OSINT☆6,302Updated last month
- An open-source digital image forensic toolset☆2,900Updated this week
- Wi-Fi Exploitation Framework☆2,540Updated 8 months ago
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆6,891Updated last year
- Discover the location of nearby Telegram users 📡🌍☆1,130Updated last year
- Open-source tool to bypass windows and linux passwords from bootable usb☆1,908Updated last year
- GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without l…☆1,432Updated last year
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.☆3,131Updated last year
- The recursive internet scanner for hackers. 🧡☆8,451Updated this week
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,104Updated 2 weeks ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆8,670Updated 3 weeks ago
- Never ever ever use pixelation as a redaction technique☆8,008Updated last year
- An OSINT tool to search for accounts by username and email in social networks.☆3,483Updated 2 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,103Updated 6 months ago
- Collections of tools and methods created to aid in OSINT collection☆3,016Updated last year
- Automagically reverse-engineer REST APIs via capturing traffic☆8,873Updated this week
- Tools and Techniques for Red Team / Penetration Testing☆6,693Updated last month
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,079Updated 3 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,230Updated 3 months ago
- Hide your scrapers IP behind the cloud. Provision proxy servers across different cloud providers to improve your scraping success.☆1,462Updated last week
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,443Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,021Updated last week
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,668Updated 3 years ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites☆12,412Updated this week
- Pythonic AI generation of images and videos☆8,104Updated 7 months ago
- Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.☆3,455Updated last month
- List of API's for gathering information about phone numbers, addresses, domains etc☆1,800Updated this week
- List of Github repositories and articles with list of dorks for different search engines☆2,290Updated last month
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,595Updated 3 weeks ago