war-and-code / StitchLinks
Python Remote Administration Tool
☆13Updated 8 years ago
Alternatives and similar repositories for Stitch
Users that are interested in Stitch are comparing it to the libraries listed below
Sorting:
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆50Updated 6 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Linux setup tool for Kali Linux☆79Updated 6 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Updated 6 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 8 years ago
- Script to automate, manage, and multithread Nikto scans.☆61Updated 5 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- A fileless Windows keylogger that exfils via DNS.☆33Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- Enterprise WPA Wireless Tool Suite☆85Updated 2 years ago
- Self contained htaccess shells and attacks☆14Updated 7 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- scripts for pentesting☆88Updated 6 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago