sundowndev / covermyass
Post-exploitation tool to cover your tracks on a compromised machine (beta)
☆387Updated 2 years ago
Alternatives and similar repositories for covermyass:
Users that are interested in covermyass are comparing it to the libraries listed below
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆370Updated 2 years ago
- A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module.☆163Updated 2 years ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆399Updated last year
- 🔎 shodansploit > v1.3.0☆534Updated 2 years ago
- Dorks Eye Google Hacking Dork Scraping and Searching Script. Dorks Eye is a script I made in python 3. With this tool, you can easily fin…☆652Updated last month
- LeakLooker GUI - Discover, browse and monitor database/source code leaks☆288Updated 2 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆365Updated last year
- Security Tool for Reconnaissance and Information Gathering on a website. (python 3.x)☆451Updated last year
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆202Updated 8 months ago
- Turn PuTTY into an SSH login bruteforcing tool.☆284Updated 4 years ago
- Pentesting automation platform that combines hacking tools to complete assessments☆461Updated 2 months ago
- LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to he…☆408Updated 6 years ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆588Updated 10 months ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆507Updated 11 months ago
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆456Updated 4 years ago
- A typical search engine dork scanner scrapes search engines with dorks that you provide in order to find vulnerable URLs.☆252Updated last year
- fully automated pentesting tool☆509Updated 2 years ago
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.☆594Updated 2 years ago
- Automated rogue access point setup tool.☆194Updated 3 years ago
- A simple multi-threaded distributed SSH brute-forcing tool written in Python☆459Updated 2 years ago
- Zero Infrastructure Password Cracking☆402Updated 7 months ago
- HostHunter a recon tool for discovering hostnames using OSINT techniques.☆1,110Updated last year
- C2 Powershell Command & Control Framework with BuiltIn Commands☆490Updated last year
- Reverse shell generator written in Python 3.☆525Updated last year
- Metasploit custom modules, plugins, resource script and.. awesome metasploit collection☆389Updated 2 years ago
- NekoBot | Auto Exploiter With 500+ Exploit 2000+ Shell☆369Updated 3 years ago
- Python Tool that gives you the ability to run Advanced Google Queries (Known as Google Dorks - Google Dorking)☆1,151Updated last year
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆522Updated last year
- uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or direc…☆820Updated 2 years ago
- OSINT tool - gets data from services like shodan, censys etc. in one app☆642Updated last year