sensity-ai / dotLinks
The Deepfake Offensive Toolkit
☆4,467Updated last year
Alternatives and similar repositories for dot
Users that are interested in dot are comparing it to the libraries listed below
Sorting:
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,178Updated 2 months ago
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,230Updated 5 months ago
- An open-source digital image forensic toolset☆3,056Updated 4 months ago
- Wi-Fi Exploitation Framework☆2,634Updated 2 months ago
- A curated list of useful resources that cover Offensive AI.☆1,305Updated 2 weeks ago
- Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.☆3,641Updated 6 months ago
- Bumble's Private Detector - a pretrained model for detecting lewd images☆1,336Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,550Updated 3 weeks ago
- Automagically reverse-engineer REST APIs via capturing traffic☆9,172Updated this week
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,102Updated 2 years ago
- Scanning APK file for URIs, endpoints & secrets.☆5,736Updated 3 months ago
- Browser In The Browser (BITB) Templates☆2,859Updated last year
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,931Updated 2 years ago
- An Open-source LTE Downlink/Uplink Eavesdropper☆2,069Updated last year
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,075Updated last year
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.☆3,156Updated last year
- GitHub Data Analysis Framework.☆1,875Updated last year
- AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.☆823Updated last week
- a file-sharing tool that allows you to find the responsible person in case of a leakage☆1,102Updated 3 years ago
- Open-source tool to bypass windows and linux passwords from bootable usb☆1,963Updated 2 years ago
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,724Updated 4 years ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,921Updated last year
- A playground to generate images from any text prompt using Stable Diffusion (past: using DALL-E Mini)☆2,752Updated last year
- The RF and reverse engineering framework for everyone. Follow and ★ to show your support!☆1,846Updated last week
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,618Updated 9 months ago
- Simple C++ Image Steganography tool to encrypt and hide files inside images using Least-Significant-Bit encoding.☆1,056Updated last year
- Panthera(P.)uncia - Official CLI utility for Osprey Vision, Subdomain Center & Exploit Observer.☆663Updated 5 months ago
- a drop-in replacement for Nmap powered by shodan.io☆3,147Updated 7 months ago
- List of regex for scraping secret API keys and juicy information.☆723Updated 3 years ago
- Real-time HTTP Intrusion Detection☆3,076Updated last year