The Deepfake Offensive Toolkit
β4,532Jun 14, 2024Updated last year
Alternatives and similar repositories for dot
Users that are interested in dot are comparing it to the libraries listed below
Sorting:
- Real-time face swap for PC streaming or video callsβ30,565Nov 8, 2024Updated last year
- The recursive internet scanner for hackers. π§‘β9,450Updated this week
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.β1,263Dec 9, 2025Updated 2 months ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ7,111Mar 12, 2024Updated last year
- π΅οΈββοΈ Offensive Google framework.β18,465Feb 5, 2026Updated 3 weeks ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,941Oct 7, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β14,645Oct 6, 2025Updated 4 months ago
- π΅οΈββοΈ Collect a dossier on a person by username from thousands of sitesβ19,102Updated this week
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniβ¦β1,370Oct 27, 2023Updated 2 years ago
- Automagically reverse-engineer REST APIs via capturing trafficβ9,247Feb 23, 2026Updated last week
- RedEye is a visual analytic tool supporting Red & Blue Team operationsβ2,738Oct 20, 2023Updated 2 years ago
- The Havoc Frameworkβ8,190Dec 18, 2025Updated 2 months ago
- The Token Stealerβ512Jul 13, 2022Updated 3 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRsβ1,230Aug 18, 2023Updated 2 years ago
- Spoofing desktop login applications with WinForms and WPFβ177Feb 19, 2024Updated 2 years ago
- Never ever ever use pixelation as a redaction techniqueβ8,241Mar 15, 2024Updated last year
- it is very goodβ515Dec 20, 2022Updated 3 years ago
- Gather and update all available and newest CVEs with their PoC.β7,573Updated this week
- Ready to go Phishing Platformβ1,108May 6, 2025Updated 9 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.β1,198Oct 16, 2023Updated 2 years ago
- Analyse your malware to surgically obfuscate itβ519Dec 17, 2025Updated 2 months ago
- EDR Lab for Experimentation Purposesβ1,413Updated this week
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounβ¦β10,249Jan 25, 2026Updated last month
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methodsβ1,470Aug 18, 2023Updated 2 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accountsβ1,369Oct 22, 2025Updated 4 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.β787Jan 9, 2025Updated last year
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ3,610Nov 14, 2025Updated 3 months ago
- Find, verify, and analyze leaked credentialsβ24,779Updated this week
- A next-generation crawling and spidering framework.β15,619Updated this week
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.β2,188Jan 5, 2026Updated last month
- βοΈπ€« Stealth redirector for your red team operation securityβ1,066Jul 6, 2025Updated 7 months ago
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts waβ¦β1,051Oct 14, 2025Updated 4 months ago
- Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.β3,760Jan 26, 2026Updated last month
- linWinPwn is a bash script that streamlines the use of a number of Active Directory toolsβ2,156Updated this week
- Browser In The Browser (BITB) Templatesβ2,887Jan 26, 2024Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDRβ3,161Mar 28, 2025Updated 11 months ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windowsβ¦β2,055Dec 11, 2024Updated last year
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β21,078Mar 5, 2025Updated 11 months ago
- Send phishing messages and attachments to Microsoft Teams usersβ1,106Jun 19, 2024Updated last year