Python scripts and tools built during my learning journey
☆31Nov 14, 2025Updated 4 months ago
Alternatives and similar repositories for AUTOPEON-V1
Users that are interested in AUTOPEON-V1 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool that automates fileless SSH backdoor injection—bypassing CA checks, erasing logs, creating long‑lived (up to 9999 days) passwordle…☆31Updated this week
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- ☆30May 29, 2025Updated 9 months ago
- hostagram osint tool Instagram | hostagram 1.4☆106Mar 1, 2026Updated 3 weeks ago
- ☆29Jan 19, 2026Updated 2 months ago
- Herramienta avanzada de escaneo XSS (Cross-Site Scripting) para auditorías de seguridad web, con capacidades de evasión de WAF y generaci…☆88Jan 7, 2026Updated 2 months ago
- Recon Automation☆11Sep 14, 2024Updated last year
- A Conky For parrot Os☆10Dec 3, 2018Updated 7 years ago
- Bug Hunter is a command-line tool designed to assist in the bug hunting process for web applications. It automates several tasks such as …☆138Oct 30, 2025Updated 4 months ago
- Oh My Zsh theme based on Parrot OS bash theme☆14Nov 10, 2023Updated 2 years ago
- Dragon Drain attack packaged as airgeddon plugin☆33Mar 11, 2026Updated 2 weeks ago
- A complete, hands-on guide to mastering Parrot OS for cybersecurity and ethical hacking. Includes Linux fundamentals, permissions, script…☆21Jun 10, 2025Updated 9 months ago
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆39Feb 3, 2025Updated last year
- ☆28Apr 2, 2021Updated 4 years ago
- 🌐 Devploit v 2.3 Information Gathering Tool🕵️☆17Apr 28, 2018Updated 7 years ago
- Github repo from YouTube tutorial about customizing Airgeddon's Captive Portal template.☆14Aug 29, 2023Updated 2 years ago
- A lightweight OSINT tool for performing WHOIS checks, DNS lookups, email harvesting, and social media scanning.☆26Jun 6, 2025Updated 9 months ago
- Offensive Security & Red Teaming Labs and Projects☆26Aug 26, 2025Updated 6 months ago
- Scanner for Log4j RCE CVE-2021-44228☆11Jul 6, 2022Updated 3 years ago
- Webripper Pro is a comprehensive, professional-grade web vulnerability scanner that automates the detection of security flaws in websites…☆38Jul 4, 2025Updated 8 months ago
- Subdomain monitor with reporting capabilities to Slack, Discord and Telegram☆14Dec 13, 2022Updated 3 years ago
- A powerful OSINT (Open-Source Intelligence) tool for searching usernames across 50+ social media platforms, with AI-powered analysis and …☆20Sep 7, 2025Updated 6 months ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆21Aug 11, 2022Updated 3 years ago
- JavaScript Racing is an adrenaline-packed racing game where players maneuver their car to avoid obstacles and earn points. Developed with…☆24Oct 25, 2023Updated 2 years ago
- Truncate strings in a human-friendly way.☆14Dec 5, 2021Updated 4 years ago
- Checks that Haskell files are linted with HLint.☆12Aug 28, 2022Updated 3 years ago
- Red Team Scaner☆58Nov 25, 2025Updated 3 months ago
- ☆17Aug 3, 2017Updated 8 years ago
- Termux üçün Hacking Tool / Hacking Tool for Termux☆34Nov 20, 2023Updated 2 years ago
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆14Aug 21, 2024Updated last year
- A set of scripts to facilitate HTTP interception on mobile apps☆20Mar 11, 2026Updated 2 weeks ago
- this is a simple ai chatbot, with python pytorch and natural language processing.☆12Nov 22, 2021Updated 4 years ago
- Peta core: The Control Plane for MCP — secure vault, managed runtime, audit trail, and policy-based approvals.☆38Updated this week
- Professional AI Hacking Platform☆59Mar 16, 2026Updated last week
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Nov 16, 2025Updated 4 months ago
- ☆13Oct 1, 2022Updated 3 years ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- Game modes of Zombie Plague Special☆13Sep 3, 2023Updated 2 years ago
- Tool to make OSINT to phone numbers with the help of APILayer, using its api together with Number Verification API. 🕵🏽♂️☆75Nov 17, 2024Updated last year