The Deepfake Offensive Toolkit
β4,543Jun 14, 2024Updated last year
Alternatives and similar repositories for dot
Users that are interested in dot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Real-time face swap for PC streaming or video callsβ30,783Nov 8, 2024Updated last year
- The recursive internet scanner for hackers. π§‘β9,633Updated this week
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.β1,278Apr 23, 2026Updated last week
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniβ¦β1,384Oct 27, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β15,003Oct 6, 2025Updated 6 months ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The Token Stealerβ517Jul 13, 2022Updated 3 years ago
- Automagically reverse-engineer REST APIs via capturing trafficβ9,453Updated this week
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,945Oct 7, 2023Updated 2 years ago
- Spoofing desktop login applications with WinForms and WPFβ178Feb 19, 2024Updated 2 years ago
- Analyse your malware to surgically obfuscate itβ527Dec 17, 2025Updated 4 months ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ7,133Mar 12, 2024Updated 2 years ago
- π΅οΈββοΈ Offensive Google framework.β18,763Apr 10, 2026Updated 3 weeks ago
- π΅οΈββοΈ Collect a dossier on a person by username from 3000+ sitesβ21,966Updated this week
- The Havoc Frameworkβ8,311Dec 18, 2025Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A memory-based evasion technique which makes shellcode invisible from process start to end.β1,198Oct 16, 2023Updated 2 years ago
- Never ever ever use pixelation as a redaction techniqueβ8,302Mar 15, 2024Updated 2 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRsβ1,233Aug 18, 2023Updated 2 years ago
- it is very goodβ515Dec 20, 2022Updated 3 years ago
- Ready to go Phishing Platformβ1,130May 6, 2025Updated 11 months ago
- EDR Lab for Experimentation Purposesβ1,442Mar 1, 2026Updated 2 months ago
- Gather and update all available and newest CVEs with their PoC.β7,726Updated this week
- Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.β3,775Jan 26, 2026Updated 3 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.β792Jan 9, 2025Updated last year
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An arbitrary face-swapping framework on images and videos with one single trained model!β5,159Aug 6, 2024Updated last year
- Find, verify, and analyze leaked credentialsβ25,995Updated this week
- βοΈπ€« Stealth redirector for your red team operation securityβ1,075Mar 1, 2026Updated 2 months ago
- DeepFaceLab is the leading software for creating deepfakes.β19,163Nov 13, 2024Updated last year
- A next-generation crawling and spidering framework.β16,613Updated this week
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methodsβ1,473Aug 18, 2023Updated 2 years ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounβ¦β10,535Apr 23, 2026Updated last week
- This map lists the essential techniques to bypass anti-virus and EDRβ3,253Mar 28, 2025Updated last year
- π Generate malicious PDF test files for testing phone-home callbacks, SSRF, XSS, NTLM credential theft, and data exfiltration in PDF vieβ¦β3,673Apr 20, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accountsβ1,382Mar 9, 2026Updated last month
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rulesβ¦β5,999Jul 12, 2024Updated last year
- Send phishing messages and attachments to Microsoft Teams usersβ1,114Jun 19, 2024Updated last year
- Rust Weaponization for Red Team Engagements.β3,003Apr 25, 2024Updated 2 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.β2,237Apr 24, 2026Updated last week
- RedEye is a visual analytic tool supporting Red & Blue Team operationsβ2,747Oct 20, 2023Updated 2 years ago
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β21,362Updated this week