surajvirus3 / Red-team-tools-
☆21Updated 2 years ago
Alternatives and similar repositories for Red-team-tools-:
Users that are interested in Red-team-tools- are comparing it to the libraries listed below
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆77Updated last week
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 4 years ago
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆20Updated this week
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆59Updated last year
- Clipboard poisoning attack.☆56Updated 4 years ago
- PassBreaker☆60Updated last year
- This is a exploit with the capability to control ip camera movement even without a username and password.☆59Updated last week
- Hacking with PasteJacking technique☆21Updated 9 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆46Updated 9 months ago
- The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities…☆32Updated last week
- DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others T…☆143Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆45Updated last year
- Tool for automate bug hunting process 🔍 --> 🍭☆38Updated 8 months ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆21Updated last year
- 🕵️ Email osint tool☆62Updated last year
- Chiasmodon Mobile - OSINT Tool for Domain Information Gathering on Android.☆13Updated last year
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆91Updated last year
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆22Updated 3 months ago
- Nmap & SQL injection automation tool☆33Updated 6 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- Evora is the best AI personal assistant bot in the field of ethical hacking and penetration testing. She has a high level of accuracy and…☆77Updated 6 months ago
- Python-based web scraper for a darkweb marketplace on the Tor network.☆30Updated 7 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- This Discord Rat give you the best way to control victims pc on discord.☆15Updated 3 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆174Updated 8 months ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated 4 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆45Updated last year
- WebSift is an OSINT ethical hacking tool designed to scrape and extract emails, phone numbers, and social media links or other URLs from …☆77Updated this week
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 7 months ago