usr2r00t / OASCLinks
OpenAI Security Console - Python3 AI-powered Cybersecurity Framework
☆16Updated 2 years ago
Alternatives and similar repositories for OASC
Users that are interested in OASC are comparing it to the libraries listed below
Sorting:
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated last year
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- Hax is a mini-tool with really useful hacking tools.☆20Updated 2 years ago
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆38Updated 3 years ago
- An Effiecent Tool To Change Tor IP's in Seconds,change mac address and clean all logs☆38Updated 4 years ago
- Who We Are☆21Updated last year
- 🔥Ready, Aim, Fire.🔥☆18Updated 3 years ago
- A Simple Script For SSH BruteForce☆38Updated 2 years ago
- Evildork targeting your fiancee👁️☆92Updated 2 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆26Updated 5 years ago
- A tool designed to analyse email headers☆40Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆68Updated 2 years ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated 2 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated 2 years ago
- Rubber Ducky powered by NeoKey☆28Updated last year
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Updated 2 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Updated 3 years ago
- Mass bruteforce authentication of common services with common credentials.☆53Updated 2 years ago
- want to remove sensitive data from photos or even view it? use autoexif to easily help you do that no more remembering syntaxs with this …☆39Updated 9 months ago
- Information Gathering Simplified.☆74Updated 3 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆93Updated 4 months ago
- Obtain an email full profile including reputation, consistency, deliverability, social networks account linked, plus more data points.☆40Updated 2 years ago
- Sphinx.bot is a platform for collecting data leaks. All information recorded here is publicly available on the web. Any malicious use of …☆50Updated 2 years ago
- HacKing Tools Downloader: Downloading HacKing Tools and exporting by categories to $HOME directory☆88Updated 3 years ago
- 🗺 A map of OSINT tools.☆19Updated 2 years ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 5 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆16Updated 2 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆47Updated 2 years ago