Lists (2)
Sort Name ascending (A-Z)
Starred repositories
real time face swap and one-click video deepfake with only a single image
A spy pixel which can be emedded into web pages or emails.
Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.
The best WiFi spy avalaible for hire! Made for hackers, for hackers
Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethical hackers and security engineers.
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
change your Ip address automatically This tool based on tor project
Use Python to map a website's internal links. And then apply D3 to visualize those connections as a network graph.
NucleiScanner is a Powerful Automation tool for detecting Unknown Vulnerabilities in the Web Applications
🌐 The Internet OS! Free, Open-Source, and Self-Hostable.
Slides and Codes used for the workshop Red Team Infrastructure Automation
This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, intelligence gathering, physical intrusion, phishing, mobile …
Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality revolves around searching for domain-related data, including …
Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.
Microsoft-Outlook-Remote-Code-Execution-Vulnerability
An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.
Cam VIrus shoots from the target's phone front camera or PC webcam just sending a link.
8 Lessons, Kick-start Your Cybersecurity Learning.
A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities
A simple tool for bypassing file upload restrictions.
A natural language interface for computers
Instant voice cloning by MIT and MyShell.
SQL Injection Vulnerability Scanner made with Python
Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).
JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the targeted application. Also includes a C2 for executing custom Java…