yohanes / akira-bruteforceLinks
☆314Updated 10 months ago
Alternatives and similar repositories for akira-bruteforce
Users that are interested in akira-bruteforce are comparing it to the libraries listed below
Sorting:
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆608Updated last month
- Best hands-on lab for learning the fundamentals of cybersecurity and penetration testing workflows also packaged as Docker containers for…☆345Updated last month
- Guardian is a production-ready AI-powered penetration testing automation CLI tool that leverages Google Gemini and LangChain to orchestra…☆606Updated 3 weeks ago
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆288Updated 6 months ago
- ID Virtual Environment a.k.a IDVE☆31Updated 4 months ago
- Security advisories for vulnerabilities☆70Updated last year
- MITM proxy for TCP/TLS/DTLS/UDP traffic, with STARTTLS, IoT, Thick Client and more.☆679Updated 3 weeks ago
- Unofficial and insecure Signal app, used by senior Trump officials like Mike Waltz, downloaded from the official TeleMessage website☆193Updated 8 months ago
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆446Updated 8 months ago
- Integrate LLM models directly into Ghidra for automated code refactoring and analysis.☆240Updated last month
- WiFi Geolocation Spoofing with the ESP8266☆73Updated 7 years ago
- Collection of links on bad opsec☆470Updated last year
- A list of public attacks on BitLocker☆406Updated 5 months ago
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆516Updated 7 months ago
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆975Updated this week
- Material Untuk Belajar Cyber Security.☆72Updated 5 months ago
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆153Updated 2 years ago
- ☆14Updated 9 months ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆435Updated 2 weeks ago
- CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH☆509Updated 7 months ago
- Deep Linux runtime visibility meets Wireshark☆302Updated 2 months ago
- A Wiki about Hardware Hacking☆450Updated last month
- ☆243Updated last year
- A Notepad-like simple text editor where files are saved (and later loaded) encrypted with AES-256.☆98Updated 3 weeks ago
- The application consists of several vulnerable web applications that are integrated with Wazuh.☆21Updated 2 years ago
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆432Updated 2 months ago
- Sending file through ICMP packet using PING☆19Updated last year
- Tosint (Telegram OSINT) is a powerful tool designed to extract valuable information from Telegram bots and channels. It serves as an esse…☆783Updated last year
- https://osint.sh - All in one Information Gathering Tools☆93Updated 5 years ago
- A simple, very experimental TPM sniffer for LPC bus☆669Updated last year