spyboy-productions / CipherGist
End-to-End Encrypted Messaging via GitHub Gists
☆17Updated last month
Alternatives and similar repositories for CipherGist
Users that are interested in CipherGist are comparing it to the libraries listed below
Sorting:
- This tool uses the GitHub API to scan repositories owned by a user for email addresses and associated names. It provides options to scan …☆35Updated 4 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆60Updated last year
- Mass bruteforce authentication of common services with common credentials.☆47Updated last year
- Nmap & SQL injection automation tool☆34Updated 7 months ago
- FIshShell is a multi-session handler and Windows & Linux backdoor payload generator. It allows users\targets to connect to the server (ot…☆8Updated 11 months ago
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆29Updated 3 weeks ago
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆91Updated last year
- PassBreaker☆61Updated last year
- Boost website hits by generating requests from multiple proxy IPs.☆67Updated last year
- Social Engineering Browser Update Attack.☆56Updated last year
- A tool for automatically change the Tor IP address over time.☆86Updated last month
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆24Updated last month
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆34Updated this week
- This is a exploit with the capability to control ip camera movement even without a username and password.☆59Updated last month
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 4 years ago
- Kali Packerge Manager☆59Updated last year
- Interactive shell to execute commands anonymously using Proxychains and Tor☆40Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- ☆62Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆25Updated 2 years ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated 11 months ago
- Hacking with PasteJacking technique☆22Updated 10 months ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆10Updated 2 months ago
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆78Updated 10 months ago
- Clipboard poisoning attack.☆56Updated 4 years ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated 5 months ago
- Auto exploitation tool for CVE-2024-24401.☆34Updated 8 months ago
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆81Updated 3 weeks ago