The Deepfake Offensive Toolkit
β4,540Jun 14, 2024Updated last year
Alternatives and similar repositories for dot
Users that are interested in dot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Real-time face swap for PC streaming or video callsβ30,717Nov 8, 2024Updated last year
- The recursive internet scanner for hackers. π§‘β9,583Updated this week
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.β1,275Dec 9, 2025Updated 4 months ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniβ¦β1,375Oct 27, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β14,816Oct 6, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The Token Stealerβ514Jul 13, 2022Updated 3 years ago
- Automagically reverse-engineer REST APIs via capturing trafficβ9,346Updated this week
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,944Oct 7, 2023Updated 2 years ago
- Spoofing desktop login applications with WinForms and WPFβ177Feb 19, 2024Updated 2 years ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ7,120Mar 12, 2024Updated 2 years ago
- Analyse your malware to surgically obfuscate itβ527Dec 17, 2025Updated 3 months ago
- π΅οΈββοΈ Offensive Google framework.β18,646Mar 14, 2026Updated 3 weeks ago
- π΅οΈββοΈ Collect a dossier on a person by username from 3000+ sitesβ19,356Apr 4, 2026Updated last week
- The Havoc Frameworkβ8,266Dec 18, 2025Updated 3 months ago
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A memory-based evasion technique which makes shellcode invisible from process start to end.β1,198Oct 16, 2023Updated 2 years ago
- Never ever ever use pixelation as a redaction techniqueβ8,290Mar 15, 2024Updated 2 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRsβ1,232Aug 18, 2023Updated 2 years ago
- it is very goodβ515Dec 20, 2022Updated 3 years ago
- Gather and update all available and newest CVEs with their PoC.β7,675Updated this week
- EDR Lab for Experimentation Purposesβ1,430Mar 1, 2026Updated last month
- Ready to go Phishing Platformβ1,122May 6, 2025Updated 11 months ago
- Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.β3,772Jan 26, 2026Updated 2 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.β790Jan 9, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Find, verify, and analyze leaked credentialsβ25,667Updated this week
- βοΈπ€« Stealth redirector for your red team operation securityβ1,068Mar 1, 2026Updated last month
- DeepFaceLab is the leading software for creating deepfakes.β19,128Nov 13, 2024Updated last year
- A next-generation crawling and spidering framework.β16,496Updated this week
- An arbitrary face-swapping framework on images and videos with one single trained model!β5,146Aug 6, 2024Updated last year
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounβ¦β10,418Mar 27, 2026Updated 2 weeks ago
- This map lists the essential techniques to bypass anti-virus and EDRβ3,183Mar 28, 2025Updated last year
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methodsβ1,473Aug 18, 2023Updated 2 years ago
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ3,647Updated this week
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accountsβ1,376Mar 9, 2026Updated last month
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rulesβ¦β5,986Jul 12, 2024Updated last year
- Send phishing messages and attachments to Microsoft Teams usersβ1,113Jun 19, 2024Updated last year
- Rust Weaponization for Red Team Engagements.β2,995Apr 25, 2024Updated last year
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.β2,220Jan 5, 2026Updated 3 months ago
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β21,300Updated this week
- RedEye is a visual analytic tool supporting Red & Blue Team operationsβ2,743Oct 20, 2023Updated 2 years ago