VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute force and other things... You have many choices. If you want to learn penetration , VOID may be a teacher for you. Because its open source code project. Please look VOID's source code and examine commands! And…
☆38May 23, 2022Updated 3 years ago
Alternatives and similar repositories for VOID
Users that are interested in VOID are comparing it to the libraries listed below
Sorting:
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆22Sep 18, 2024Updated last year
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- Thanos is open source website vulnerability scanner.☆26Jan 18, 2023Updated 3 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Apr 5, 2022Updated 3 years ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Dec 26, 2022Updated 3 years ago
- Remote command shell application written in C# targeting the .NET runtime.☆29Mar 1, 2026Updated last week
- PHP lab to test captcha bypassing☆30Jan 8, 2024Updated 2 years ago
- An Automated Database Hacking Software with Database Dorks Hacking☆30Sep 7, 2019Updated 6 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆40Feb 24, 2023Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- A python based RECON Tool for collecting data on people by their usernames. Capable of getting data from 50+ websites as of 28/06/2022.☆14Jul 12, 2022Updated 3 years ago
- hacking tool menu!☆26Aug 4, 2021Updated 4 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆35Updated this week
- Linux Cyber Warfare Distro☆21Dec 16, 2025Updated 2 months ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆60Jan 18, 2023Updated 3 years ago
- Autorev.sh generates reverse shell codes for reverse shell . Supports linux and windows☆17Apr 8, 2022Updated 3 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 6 months ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 5 months ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆73Dec 14, 2023Updated 2 years ago
- SQL Detector Tool In Go Language☆22Jan 10, 2023Updated 3 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆22Jan 6, 2026Updated 2 months ago
- Anvil Secure's Burp extension for signing AWS requests with SigV4☆21Aug 20, 2025Updated 6 months ago
- Information Gathering Simplified.☆80Jan 17, 2023Updated 3 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆45Jun 19, 2023Updated 2 years ago
- Discord bot created to automate bug bounty recon, automated scans and information gathering via a discord server☆81Jan 8, 2024Updated 2 years ago
- Google Dork Finder is a Python tool designed to facilitate the use of Google Dorking for searching specific information on the web.☆27Nov 27, 2024Updated last year
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- You own your phone. You should be able to use it. GrapheneOS is the most secure Android OS, but hardening comes at the cost of usability.…☆27Aug 27, 2024Updated last year
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆193May 24, 2025Updated 9 months ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- Spring Cloud Function Vulnerable Application / CVE-2022-22963☆19Apr 1, 2022Updated 3 years ago
- An account hacking program with some built-in action keywords.☆14Apr 1, 2021Updated 4 years ago