tsuki-sploit VS remote_hacker_probe

Compare tsuki-sploit vs remote_hacker_probe and see what are their differences.

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
tsuki-sploit remote_hacker_probe
1 11
43 222
- 0.0%
3.9 0.0
about 1 year ago about 2 years ago
C C
MIT License MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

tsuki-sploit

Posts with mentions or reviews of tsuki-sploit. We have used some of these posts to build our list of alternatives and similar projects.

remote_hacker_probe

Posts with mentions or reviews of remote_hacker_probe. We have used some of these posts to build our list of alternatives and similar projects.

What are some alternatives?

When comparing tsuki-sploit and remote_hacker_probe you can also consider the following projects:

pixiewps - An offline Wi-Fi Protected Setup brute-force utility

Keylogger - A simple keylogger for Windows, Linux and Mac

thc-ipv6 - IPv6 attack toolkit

RATwurst - Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.

UnSAFE_Bank - Vulnerable Banking Suite

TheFatRat - Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .

PhoneSploit-Pro - An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.

pig - A Linux packet crafting tool.

Lockdoor-Framework - 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources

casper-fs - Casper-fs is a Custom Hidden Linux Kernel Module generator. Each module works in the file system to protect and hide secret files.

Villain - Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).

h4cker - This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.