Octopus
Spoofy
Octopus | Spoofy | |
---|---|---|
1 | 2 | |
710 | 535 | |
- | - | |
1.8 | 5.4 | |
almost 3 years ago | 2 months ago | |
Python | Python | |
GNU General Public License v3.0 only | Creative Commons Zero v1.0 Universal |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Octopus
Spoofy
What are some alternatives?
Lucifer - A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
vulnerable-code-snippets - Vulnerable code snippets repository showcasing different vulnerabilities to practice code analysis skills.
CrackMapExec - A swiss army knife for pentesting networks
SSTImap - Automatic SSTI detection and exploitation tool with interactive interface
HavocNotion - A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally safe or stable, built as a PoC to showcase Havoc C2's modular C2 channel interface.
Sooty - The SOC Analysts all-in-one CLI tool to automate and speed up workflow.
crimson - Web Application Security Testing Tools
mi-x - Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploitability (runtime execution, configuration, permissions, existence of a mitigation, OS, etc..)
blackhat_python_book_code - Source code and exercises from the book "Black Hat Python" by Justin Seitz.
Subdominator - The Internets #1 Subdomain Takeover Tool
Redeye - Redeye is a tool intended to help you manage your data during a pentest operation
trustymail - Scan domains and return data based on trustworthy email best practices