ytisf / WhisperLinks
A pentesting Firefox spy extension - PoC
☆10Updated 9 years ago
Alternatives and similar repositories for Whisper
Users that are interested in Whisper are comparing it to the libraries listed below
Sorting:
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 6 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆20Updated 7 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆11Updated 4 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- pen testing scripts☆12Updated 4 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 8 years ago
- Undetectable Windows Payload Generation☆10Updated 8 years ago
- Spider or repeater to find all links.☆10Updated 4 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated last month
- Repository of tools used in my blog☆51Updated last year
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Updated 5 years ago
- Open-source advanced cracking tool made in Electron.JS☆19Updated 5 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- Simple script to download some missing tools in Kali☆33Updated 5 years ago
- Password Recovery Toolkit For Windows Written in Python 3☆25Updated 2 years ago
- ☆20Updated 12 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Updated 3 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 6 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- [BASH] Password generator through a wordlist☆12Updated 12 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆28Updated 5 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 4 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆32Updated 5 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Updated 3 years ago