sensity-ai / dotLinks
The Deepfake Offensive Toolkit
☆4,363Updated last year
Alternatives and similar repositories for dot
Users that are interested in dot are comparing it to the libraries listed below
Sorting:
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.☆3,141Updated last year
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,129Updated 8 months ago
- Wi-Fi Exploitation Framework☆2,571Updated last month
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆6,935Updated last year
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆2,159Updated 3 weeks ago
- GitHub Data Analysis Framework.☆1,867Updated last year
- An open-source digital image forensic toolset☆2,943Updated this week
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.☆999Updated 11 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,076Updated 2 weeks ago
- Tunneling Internet traffic over Whatsapp☆2,295Updated 2 years ago
- GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without l…☆1,469Updated 2 months ago
- A collection of several hundred online tools for OSINT☆6,586Updated this week
- OOXML password remover☆588Updated 2 years ago
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys☆1,096Updated 3 months ago
- Extract files from any kind of container formats☆2,331Updated this week
- Open-source tool to bypass windows and linux passwords from bootable usb☆1,929Updated last year
- HiddenVM — Use any desktop OS without leaving a trace.☆2,456Updated last year
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,683Updated 3 years ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,355Updated 3 months ago
- OFRAK: unpack, modify, and repack binaries.☆1,963Updated last week
- Simple C++ Image Steganography tool to encrypt and hide files inside images using Least-Significant-Bit encoding.☆1,043Updated last year
- Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK.☆3,495Updated last month
- An Open-source LTE Downlink/Uplink Eavesdropper☆1,967Updated 8 months ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆8,934Updated last week
- Ready to go Phishing Platform☆994Updated 2 months ago
- Collections of tools and methods created to aid in OSINT collection☆3,099Updated 2 years ago
- Real-time face swap for PC streaming or video calls☆28,978Updated 8 months ago
- Take your video conference from within the matrix.