sensity-ai / dotLinks
The Deepfake Offensive Toolkit
โ4,491Updated last year
Alternatives and similar repositories for dot
Users that are interested in dot are comparing it to the libraries listed below
Sorting:
- Pythonic AI generation of images and videosโ8,140Updated last year
- ๐ Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shโ3,599Updated 2 months ago
- Wi-Fi Exploitation Frameworkโ2,761Updated 4 months ago
- An open-source digital image forensic toolsetโ3,094Updated 6 months ago
- A collection of several hundred online tools for OSINTโ7,469Updated 6 months ago
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resourcesโ2,269Updated 7 months ago
- Open-source tool to bypass windows and linux passwords from bootable usbโ1,963Updated 2 years ago
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic lโฆโ2,733Updated 4 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!โ2,189Updated 4 months ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounโฆโ10,142Updated 2 weeks ago
- Extract files from any kind of container formatsโ2,428Updated this week
- a file-sharing tool that allows you to find the responsible person in case of a leakageโ1,103Updated 4 years ago
- a drop-in replacement for Nmap powered by shodan.ioโ3,175Updated 9 months ago
- Terminal-based toolkit for GitHub data analysis.โ1,886Updated 2 weeks ago
- The recursive internet scanner for hackers. ๐งกโ9,400Updated this week
- Ready to go Phishing Platformโ1,100Updated 9 months ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.โ18,797Updated last month
- Automagically reverse-engineer REST APIs via capturing trafficโ9,220Updated 3 weeks ago
- Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.โ3,743Updated 2 weeks ago
- Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.โ5,007Updated last year
- Web Attack Cheat Sheetโ4,394Updated this week
- A OSINT tool to obtain a target's phone number just by having his email addressโ2,582Updated last year
- An OSINT tool to search for accounts by username and email in social networks.โ5,586Updated 6 months ago
- Store files as YouTube videos == infinite disk spaceโ1,936Updated 7 years ago
- โ1,275Updated 3 years ago
- Simple C++ Image Steganography tool to encrypt and hide files inside images using Least-Significant-Bit encoding.โ1,062Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of โฆโ14,563Updated 4 months ago
- Tunneling Internet traffic over Whatsappโ3,139Updated 3 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operationsโ2,739Updated 2 years ago
- ๐ธ Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell โฆโ7,144Updated 2 years ago