All Projects → Telekiller → Similar Projects or Alternatives

885 Open source projects that are alternatives of or similar to Telekiller

Webwhatsappbot
Core to automatize whatsapp - working 11/2018
Stars: ✭ 59 (-51.64%)
Mutual labels:  hacking
Inferno
🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-13.93%)
Mutual labels:  hacking
Mitm Scripts
🔄 A collection of mitmproxy inline scripts
Stars: ✭ 109 (-10.66%)
Mutual labels:  penetration-testing
Knowledge Base
Knowledge Base 慢雾安全团队知识库
Stars: ✭ 1,351 (+1007.38%)
Mutual labels:  hacking
Stegextract
Detect hidden files and text in images
Stars: ✭ 79 (-35.25%)
Mutual labels:  penetration-testing
Androl4b
A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
Stars: ✭ 908 (+644.26%)
Mutual labels:  penetration-testing
Papers
Papers about known hacking, security, hardware, software, computer, network and other ressources.
Stars: ✭ 58 (-52.46%)
Mutual labels:  hacking
Redcloud
Automated Red Team Infrastructure deployement using Docker
Stars: ✭ 551 (+351.64%)
Mutual labels:  hacking
Apac Conferences
A community contributed consolidated list of InfoSec meetups in the Asia Pacific region.
Stars: ✭ 90 (-26.23%)
Mutual labels:  hacking
Python Books For Security
Python Books for Security
Stars: ✭ 58 (-52.46%)
Mutual labels:  penetration-testing
Impulse
💣 Impulse Denial-of-service ToolKit
Stars: ✭ 538 (+340.98%)
Mutual labels:  hacking
Gofingerprint
GoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fingerprints.
Stars: ✭ 120 (-1.64%)
Mutual labels:  hacking
Onex
onex is a hacking tool installer and package manager for hackers. Onex is a library of all hacking tools for Termux and other Linux distributions. onex can install any third party tool or any hacking tool for you.
Stars: ✭ 537 (+340.16%)
Mutual labels:  hacking
Dll hook Rs
Rust code to show how hooking in rust with a dll works.
Stars: ✭ 57 (-53.28%)
Mutual labels:  hacking
Redteam vul
红队作战中比较常遇到的一些重点系统漏洞整理。
Stars: ✭ 1,271 (+941.8%)
Mutual labels:  hacking
Hacktheworld
An Python Script For Generating Payloads that Bypasses All Antivirus so far .
Stars: ✭ 527 (+331.97%)
Mutual labels:  hacking
Whitehat
Information about my experiences on ethical hacking 💀
Stars: ✭ 54 (-55.74%)
Mutual labels:  hacking
A2sv
Auto Scanning to SSL Vulnerability
Stars: ✭ 524 (+329.51%)
Mutual labels:  hacking
Pakcrack
All in 1 Pakisthani Facebook Cloner [ 7/8/9/10/11 DIGIT ]
Stars: ✭ 105 (-13.93%)
Mutual labels:  hacking
Autoblue Ms17 010
This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010
Stars: ✭ 522 (+327.87%)
Mutual labels:  hacking
Spellbook
Micro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-56.56%)
Mutual labels:  hacking
Logkeys
📝 ⌨️ A GNU/Linux keylogger that works!
Stars: ✭ 518 (+324.59%)
Mutual labels:  hacking
Roadmap
GitBook: OSCP RoadMap
Stars: ✭ 89 (-27.05%)
Mutual labels:  penetration-testing
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+317.21%)
Mutual labels:  hacking
Shellshockhunter
It's a simple tool for test vulnerability shellshock
Stars: ✭ 52 (-57.38%)
Mutual labels:  hacking
Pythonhackingbook1
Python黑客编程之极速入门
Stars: ✭ 882 (+622.95%)
Mutual labels:  hacking
Network Threats Taxonomy
Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-35.25%)
Mutual labels:  hacking
Babysploit
👶 BabySploit Beginner Pentesting Toolkit/Framework Written in Python 🐍
Stars: ✭ 883 (+623.77%)
Mutual labels:  penetration-testing
Commando Vm
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. [email protected]
Stars: ✭ 5,030 (+4022.95%)
Mutual labels:  penetration-testing
Pythem
pentest framework
Stars: ✭ 1,060 (+768.85%)
Mutual labels:  hacking
Reconpi
ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.
Stars: ✭ 490 (+301.64%)
Mutual labels:  hacking
Pentest Notes
Collection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
Stars: ✭ 89 (-27.05%)
Mutual labels:  penetration-testing
Dockerscan
Docker security analysis & hacking tools
Stars: ✭ 1,046 (+757.38%)
Mutual labels:  hacking
Awesome Hacking
A curated list of awesome Hacking tutorials, tools and resources
Stars: ✭ 7,756 (+6257.38%)
Mutual labels:  hacking
Yams
A collection of Ansible roles for automating infosec builds.
Stars: ✭ 98 (-19.67%)
Mutual labels:  penetration-testing
Webhackersweapons
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 1,205 (+887.7%)
Mutual labels:  hacking
Drv3 Tools
(Not actively maintained, use DRV3-Sharp) Tools for extracting and re-injecting files for Danganronpa V3 for PC.
Stars: ✭ 13 (-89.34%)
Mutual labels:  hacking
Instainsane
Multi-threaded Instagram Brute Forcer (100 attemps at once)
Stars: ✭ 475 (+289.34%)
Mutual labels:  hacking
Burp Suite Error Message Checks
Burp Suite extension to passively scan for applications revealing server error messages
Stars: ✭ 45 (-63.11%)
Mutual labels:  penetration-testing
Ble Security Attack Defence
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Stars: ✭ 88 (-27.87%)
Mutual labels:  hacking
Search That Hash
🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+281.97%)
Mutual labels:  hacking
Awsbucketdump
Security Tool to Look For Interesting Files in S3 Buckets
Stars: ✭ 1,021 (+736.89%)
Mutual labels:  penetration-testing
Chimera
Chimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (+279.51%)
Mutual labels:  penetration-testing
Tweak Series
Repo for YouTube series
Stars: ✭ 44 (-63.93%)
Mutual labels:  hacking
Cthackframework
游戏外挂通用框架,快速构建外挂程序。
Stars: ✭ 78 (-36.07%)
Mutual labels:  hacking
Kubernetes Goat
Kubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
Stars: ✭ 868 (+611.48%)
Mutual labels:  hacking
Shodan Dorks
Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (-3.28%)
Mutual labels:  hacking
Shuffle
WebShell Backdoor Framework
Stars: ✭ 11 (-90.98%)
Mutual labels:  hacking
Fawkes
Fawkes is a tool to search for targets vulnerable to SQL Injection. Performs the search using Google search engine.
Stars: ✭ 108 (-11.48%)
Mutual labels:  hacking
Ecommerce Website Security Checklist
List of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built into the Techinical Specific Document, or will be checked in the Security testing phases.
Stars: ✭ 98 (-19.67%)
Mutual labels:  hacking
Githacktools
The best Hacking and PenTesting tools installer on the world
Stars: ✭ 78 (-36.07%)
Mutual labels:  hacking
Dracnmap
Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+605.74%)
Mutual labels:  hacking
Rat Via Telegram
Windows Remote Administration Tool via Telegram
Stars: ✭ 453 (+271.31%)
Mutual labels:  rat
Droidjack
Este troyano para Android es uno de los más completos. Con él vamos a poder tener acceso a remoto a todo el dispositivo infectado, desde la agenda, las llamadas y los SMS hasta el micrófono y las cámaras del smartphone. Todo.
Stars: ✭ 44 (-63.93%)
Mutual labels:  rat
Vanquish
Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Stars: ✭ 449 (+268.03%)
Mutual labels:  penetration-testing
Vailyn
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-15.57%)
Mutual labels:  penetration-testing
Hacktronian
Tools for Hacking
Stars: ✭ 857 (+602.46%)
Mutual labels:  penetration-testing
Ysf
YSF Server Functions
Stars: ✭ 77 (-36.89%)
Mutual labels:  hacking
Ripv6
Random IPv6 - circumvents restrictive IP address-based filter and blocking rules
Stars: ✭ 10 (-91.8%)
Mutual labels:  penetration-testing
Phonesploit
Using open Adb ports we can exploit a Andriod Device
Stars: ✭ 854 (+600%)
Mutual labels:  hacking
301-360 of 885 similar projects