war-and-code / StitchLinks
Python Remote Administration Tool
☆14Updated 8 years ago
Alternatives and similar repositories for Stitch
Users that are interested in Stitch are comparing it to the libraries listed below
Sorting:
- An automated way to send phishing emails from Google/G-suite.☆18Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Updated 6 years ago
- A scripted library of hacking techniques.☆18Updated 7 years ago
- A Pythonic wrapper to MassDNS☆24Updated 7 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- Linux setup tool for Kali Linux☆80Updated 7 years ago
- Query Shodan and Censys data for fast parsing☆39Updated 7 years ago
- A fileless Windows keylogger that exfils via DNS.☆33Updated 8 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆97Updated 5 years ago
- PHP Phishing Framework☆28Updated 12 years ago
- Test a network's egress controls with various levels of success and failure.☆105Updated 3 years ago
- Self contained htaccess shells and attacks☆16Updated 7 years ago
- Automated Security Assessment Reporting Tool☆37Updated 8 years ago
- A collection of scripts made duing my personal research☆29Updated 7 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 7 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 7 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆70Updated 8 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 3 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago