The Deepfake Offensive Toolkit
β4,540Jun 14, 2024Updated last year
Alternatives and similar repositories for dot
Users that are interested in dot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Real-time face swap for PC streaming or video callsβ30,646Nov 8, 2024Updated last year
- The recursive internet scanner for hackers. π§‘β9,513Updated this week
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.β1,273Dec 9, 2025Updated 3 months ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniβ¦β1,374Oct 27, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β14,721Oct 6, 2025Updated 5 months ago
- The Token Stealerβ511Jul 13, 2022Updated 3 years ago
- Automagically reverse-engineer REST APIs via capturing trafficβ9,266Mar 16, 2026Updated last week
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,942Oct 7, 2023Updated 2 years ago
- Spoofing desktop login applications with WinForms and WPFβ177Feb 19, 2024Updated 2 years ago
- Analyse your malware to surgically obfuscate itβ524Dec 17, 2025Updated 3 months ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ7,110Mar 12, 2024Updated 2 years ago
- π΅οΈββοΈ Offensive Google framework.β18,535Mar 14, 2026Updated last week
- π΅οΈββοΈ Collect a dossier on a person by username from thousands of sitesβ19,243Updated this week
- The Havoc Frameworkβ8,245Dec 18, 2025Updated 3 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.β1,198Oct 16, 2023Updated 2 years ago
- Never ever ever use pixelation as a redaction techniqueβ8,267Mar 15, 2024Updated 2 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRsβ1,229Aug 18, 2023Updated 2 years ago
- it is very goodβ515Dec 20, 2022Updated 3 years ago
- Gather and update all available and newest CVEs with their PoC.β7,624Updated this week
- EDR Lab for Experimentation Purposesβ1,422Mar 1, 2026Updated 3 weeks ago
- Ready to go Phishing Platformβ1,116May 6, 2025Updated 10 months ago
- Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.β3,767Jan 26, 2026Updated last month
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.β789Jan 9, 2025Updated last year
- Find, verify, and analyze leaked credentialsβ25,121Updated this week
- βοΈπ€« Stealth redirector for your red team operation securityβ1,066Mar 1, 2026Updated 3 weeks ago
- DeepFaceLab is the leading software for creating deepfakes.β19,080Nov 13, 2024Updated last year
- A next-generation crawling and spidering framework.β16,218Updated this week
- An arbitrary face-swapping framework on images and videos with one single trained model!β5,134Aug 6, 2024Updated last year
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounβ¦β10,325Jan 25, 2026Updated last month
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methodsβ1,472Aug 18, 2023Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDRβ3,173Mar 28, 2025Updated 11 months ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accountsβ1,373Mar 9, 2026Updated 2 weeks ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rulesβ¦β5,973Jul 12, 2024Updated last year
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ3,633Nov 14, 2025Updated 4 months ago
- Send phishing messages and attachments to Microsoft Teams usersβ1,111Jun 19, 2024Updated last year
- Rust Weaponization for Red Team Engagements.β2,991Apr 25, 2024Updated last year
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.β2,209Jan 5, 2026Updated 2 months ago
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β21,254Mar 5, 2025Updated last year
- RedEye is a visual analytic tool supporting Red & Blue Team operationsβ2,741Oct 20, 2023Updated 2 years ago