war-and-code / StitchLinks
Python Remote Administration Tool
☆13Updated 8 years ago
Alternatives and similar repositories for Stitch
Users that are interested in Stitch are comparing it to the libraries listed below
Sorting:
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆50Updated 6 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Updated 6 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Self contained htaccess shells and attacks☆15Updated 7 years ago
- A scripted library of hacking techniques.☆18Updated 7 years ago
- Linux setup tool for Kali Linux☆79Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆39Updated 8 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- A fileless Windows keylogger that exfils via DNS.☆33Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- A Pythonic wrapper to MassDNS☆24Updated 7 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- A collection of scripts made duing my personal research☆29Updated 7 years ago
- Query Shodan and Censys data for fast parsing☆39Updated 7 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 7 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- Data collection scripts for All Your Cloud Are Belong To Us conference talk☆29Updated 6 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆47Updated 3 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago