surajvirus3 / Red-team-tools-
☆21Updated 2 years ago
Alternatives and similar repositories for Red-team-tools-:
Users that are interested in Red-team-tools- are comparing it to the libraries listed below
- A tool for automatically change the Tor IP address over time.☆81Updated last month
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆60Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆45Updated last year
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆20Updated this week
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 4 years ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆21Updated last year
- Hacking with PasteJacking technique☆22Updated 10 months ago
- Clipboard poisoning attack.☆56Updated 4 years ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆59Updated 3 weeks ago
- 🕵️ Email osint tool☆62Updated last year
- DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others T…☆144Updated last year
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing and vulnerability a…☆33Updated last week
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆46Updated last year
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆44Updated 9 months ago
- PassBreaker☆61Updated last year
- Automatic tool to find Google Dorks☆34Updated 6 months ago
- Tool for automate bug hunting process 🔍 --> 🍭☆40Updated 9 months ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆23Updated 3 weeks ago
- Chiasmodon Mobile - OSINT Tool for Domain Information Gathering on Android.☆13Updated last year
- What is Phone Track? So phonetrack is a type of OSINT that is used to track someone's location just based on their telephone number☆70Updated last year
- ☆27Updated 10 months ago
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆28Updated last week
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- Evora is the best AI personal assistant bot in the field of ethical hacking and penetration testing. She has a high level of accuracy and…☆78Updated 6 months ago
- ☆16Updated 3 weeks ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated 4 months ago
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆16Updated last month
- This Discord Rat give you the best way to control victims pc on discord.☆15Updated 4 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆51Updated 4 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆55Updated last year