tsuki-sploit VS thc-ipv6

Compare tsuki-sploit vs thc-ipv6 and see what are their differences.

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
tsuki-sploit thc-ipv6
1 1
43 984
- -
3.9 3.1
about 1 year ago 10 months ago
C C
MIT License GNU Affero General Public License v3.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

tsuki-sploit

Posts with mentions or reviews of tsuki-sploit. We have used some of these posts to build our list of alternatives and similar projects.

thc-ipv6

Posts with mentions or reviews of thc-ipv6. We have used some of these posts to build our list of alternatives and similar projects.

What are some alternatives?

When comparing tsuki-sploit and thc-ipv6 you can also consider the following projects:

pixiewps - An offline Wi-Fi Protected Setup brute-force utility

dhcpcd - DHCP / IPv4LL / IPv6RA / DHCPv6 client.

remote_hacker_probe - Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.

tnat64 - IPv4 to IPv6 interceptor

UnSAFE_Bank - Vulnerable Banking Suite

THC-Archive - All releases of the security research group (a.k.a. hackers) The Hacker's Choice

PhoneSploit-Pro - An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.

Lockdoor-Framework - 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources

Villain - Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).

h4cker - This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.