All Projects → URL-obfuscator → Similar Projects or Alternatives

425 Open source projects that are alternatives of or similar to URL-obfuscator

phisherprice
All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-62.38%)
argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (-13.86%)
Skeleton
Skeleton is a Social Engineering tool attack switcher
Stars: ✭ 44 (-56.44%)
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-55.45%)
Mutual labels:  cybersecurity, redteam-tools
ScareCrow-CobaltStrike
Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)
Stars: ✭ 387 (+283.17%)
Mutual labels:  evasion, bypass-antivirus
cyberops
Cisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.
Stars: ✭ 18 (-82.18%)
Mutual labels:  cybersecurity, cyber-security
redlure-console
Distributed phishing framework designed to streamline offensive security phishing
Stars: ✭ 24 (-76.24%)
Mutual labels:  phishing-attacks, phishing-kit
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (-16.83%)
Mutual labels:  cybersecurity, redteam-tools
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+7062.38%)
Mutual labels:  cybersecurity, cyber-security
DNSWho
transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV
Stars: ✭ 47 (-53.47%)
Mutual labels:  evasion, bypass-antivirus
shark
Best Tool For Phishing, Future Of Phishing
Stars: ✭ 238 (+135.64%)
Mutual labels:  phishing-attacks, phishing-kit
Reverse Engineering Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+5605.94%)
Mutual labels:  cybersecurity, cyber-security
VirusX5
The Most Powerful Fake Page Redirecting tool...
Stars: ✭ 15 (-85.15%)
Zeek-Network-Security-Monitor
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-62.38%)
Mutual labels:  cybersecurity, cyber-security
Writeups
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-39.6%)
Mutual labels:  cybersecurity, cyberattack
CloudFrontier
Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (+0.99%)
Mutual labels:  cybersecurity, cyber-security
jerseyctf-2021-challenges
JerseyCTF 2021
Stars: ✭ 22 (-78.22%)
MsfMania
Python AV Evasion Tools
Stars: ✭ 388 (+284.16%)
Mutual labels:  evasion, bypass-antivirus
OpenVAS-Docker
A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-84.16%)
Mutual labels:  cybersecurity, cyber-security
Sn1per
Attack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+4748.51%)
Mutual labels:  cybersecurity, redteam-tools
rawsec-cybersecurity-inventory
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+51.49%)
Mutual labels:  cybersecurity, cyber-security
Sherlock
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-64.36%)
Mutual labels:  cybersecurity, cyber-security
who and what to follow
Who and what to follow in the world of cyber security
Stars: ✭ 124 (+22.77%)
Mutual labels:  cybersecurity, cyber-security
ReversePowerShell
Functions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-52.48%)
Mutual labels:  cybersecurity, cyber-security
pentesting-framework
Pentesting Framework is a bundle of penetration testing tools, Includes - security, pentesting, hacking and many more.
Stars: ✭ 90 (-10.89%)
Mutual labels:  phishing-attacks, phishing-kit
Storm-Breaker
Social engineering tool [Access Webcam & Microphone & Location Finder] With Python
Stars: ✭ 1,489 (+1374.26%)
cuc-wiki
个人教学 Wiki
Stars: ✭ 83 (-17.82%)
Mutual labels:  cybersecurity, cyber-security
Lucifer
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+199.01%)
Mutual labels:  cybersecurity, cyber-security
phishEye
phishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (-53.47%)
Mutual labels:  cybersecurity, phishing-attacks
robot hacking manual
Robot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.
Stars: ✭ 169 (+67.33%)
Mutual labels:  cybersecurity, cyber-security
goblin
一款适用于红蓝对抗中的仿真钓鱼系统
Stars: ✭ 844 (+735.64%)
Mutual labels:  cybersecurity, redteam-tools
ImpulsiveDLLHijack
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
Stars: ✭ 258 (+155.45%)
Mutual labels:  cybersecurity, redteam-tools
longtongue
Customized Password/Passphrase List inputting Target Info
Stars: ✭ 61 (-39.6%)
urlRecon
📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (-69.31%)
tryhackme-ctf
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+38.61%)
Mutual labels:  cybersecurity, cyber-security
NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-39.6%)
Mutual labels:  cybersecurity, cyber-security
Malicious-Urlv5
A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (-65.35%)
Mutual labels:  cybersecurity, phishing-attacks
recommendations-for-engineers
All of my recommendations for aspiring engineers in a single place, coming from various areas of interest.
Stars: ✭ 81 (-19.8%)
Mutual labels:  cybersecurity
TheRoadOfSO
学习安全运营的记录 | The knowledge base of security operation
Stars: ✭ 286 (+183.17%)
Mutual labels:  cybersecurity
haaukins
A Highly Accessible and Automated Virtualization Platform for Security Education
Stars: ✭ 148 (+46.53%)
Mutual labels:  cybersecurity
haiti
🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+184.16%)
Mutual labels:  cybersecurity
tex-course-index-template
A template for writing a condensed course index leveraging LaTeX indexing
Stars: ✭ 30 (-70.3%)
Mutual labels:  cybersecurity
threads
THREADS Conference Archive
Stars: ✭ 17 (-83.17%)
Mutual labels:  cyber-security
gnirts
Obfuscate string literals in JavaScript code.
Stars: ✭ 65 (-35.64%)
Mutual labels:  obfuscate
Defeat-Defender-V1.2
Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
Stars: ✭ 885 (+776.24%)
Mutual labels:  bypass-antivirus
Go Bypass
Golang Bypass Av Generator template
Stars: ✭ 606 (+500%)
Mutual labels:  bypass-antivirus
censys-recon-ng
recon-ng modules for Censys
Stars: ✭ 29 (-71.29%)
Mutual labels:  cybersecurity
SQLi-Query-Tampering
SQLi Query Tampering extends and adds custom Payload Generator/Processor in Burp Suite's Intruder. This extension gives you the flexibility of manual testing with many powerful evasion techniques.
Stars: ✭ 123 (+21.78%)
Mutual labels:  evasion
go-spyse
The official wrapper for spyse.com API, written in Go, aimed to help developers build their integrations with Spyse.
Stars: ✭ 25 (-75.25%)
Mutual labels:  cybersecurity
JustEvadeBro
JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.
Stars: ✭ 63 (-37.62%)
Mutual labels:  evasion
cuc-ns
网络安全课本
Stars: ✭ 42 (-58.42%)
Mutual labels:  cybersecurity
Dark-Phish
Dark-Phish is a complete phishing tool. For more about Dark-Phish tool please visit the website.
Stars: ✭ 57 (-43.56%)
Mutual labels:  social-engineering
sack
Identify connection of sessions for social engineering attacks.
Stars: ✭ 45 (-55.45%)
chameleon
PowerShell Script Obfuscator
Stars: ✭ 319 (+215.84%)
Mutual labels:  bypass-antivirus
Scylla
The Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 424 (+319.8%)
Mutual labels:  cybersecurity
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-21.78%)
Mutual labels:  cybersecurity
OSCP-A-Step-Forward
Opening the door, one reverse shell at a time
Stars: ✭ 126 (+24.75%)
Mutual labels:  cyber-security
Practical Malware Analysis
Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski
Stars: ✭ 16 (-84.16%)
Mutual labels:  cybersecurity
PassLock
PassLock is a medium-security password manager that encrypts passwords using Advanced Encryption Standards (AES)
Stars: ✭ 44 (-56.44%)
Mutual labels:  cybersecurity
digital-copyright
Stamp your code with a trackable digital copyright
Stars: ✭ 17 (-83.17%)
Mutual labels:  cybersecurity
1-60 of 425 similar projects