Pinned Repositories
a2sv
Auto Scanning to SSL Vulnerability
AdvPhishing
This is Advance Phishing Tool ! OTP PHISHING
angryFuzzer
Tools for information gathering
Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers.
artillery
Modern, powerful, hackable backend & API testing toolkit. Load testing & functional testing. HTTP, Socket.io, WebSockets, Kinesis, HLS etc.
assetfinder
Find domains and subdomains related to a given domain
ATSCAN
Advanced Search & Mass Exploit Scanner- فاحص متقدم لبحث و استغلال الثغرات بالجملة
AutoRecon
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
formphish
Auto phishing form-based websites
w3af
w3af: web application attack and audit framework, the open source web vulnerability scanner.
CyberSeaLOps's Repositories
CyberSeaLOps/Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers.
CyberSeaLOps/AutoRecon
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
CyberSeaLOps/Bat2Exe
Windows user interface for converting your batch files into executables.
CyberSeaLOps/BurpSuite_403Bypasser
Burpsuite Extension to bypass 403 restricted directory
CyberSeaLOps/bypass-url-parser
bypass-url-parser
CyberSeaLOps/Cheatsheet-God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
CyberSeaLOps/CrackMapExec
A swiss army knife for pentesting networks
CyberSeaLOps/DeepFaceLab
DeepFaceLab is the leading software for creating deepfakes.
CyberSeaLOps/Email-extractor
The main functionality is to extract all the emails from one or several URLs - La funcionalidad principal es extraer todos los correos electrónicos de una o varias Url
CyberSeaLOps/evilginx2-1
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
CyberSeaLOps/Fully-Undetectable-Techniques
CyberSeaLOps/GDorks
Google Dork List - Uncover the Hidden Gems of the Internet ( There are at least 320+ categories )
CyberSeaLOps/jenkins-attack-framework
CyberSeaLOps/JenkinsHunter
python3 script that searches a network range for instances of unauthenticated Jenkins hosts. Author: Cedric Owens
CyberSeaLOps/nim-shell
Reverse shell that can bypass windows defender detection
CyberSeaLOps/nuclei-templates
Community curated list of templates for the nuclei engine to find security vulnerabilities.
CyberSeaLOps/offensive-ai-compilation
A curated list of useful resources that cover Offensive AI.
CyberSeaLOps/OSINTSurveillance
Strumenti utili per la ricerca di WebCam di pubblico accesso
CyberSeaLOps/osmedeus
A Workflow Engine for Offensive Security
CyberSeaLOps/PayGen
FUD metasploit Persistence RAT
CyberSeaLOps/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
CyberSeaLOps/Pentest-Tools
CyberSeaLOps/PyDorker
Python tool for Dorking
CyberSeaLOps/reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
CyberSeaLOps/Reconky-Automated_Bash_Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
CyberSeaLOps/RedTeaming-Tactics-and-Techniques
Red Teaming Tactics and Techniques
CyberSeaLOps/SniperPhish
SniperPhish - The Web-Email Spear Phishing Toolkit
CyberSeaLOps/trape
People tracker on the Internet: OSINT analysis and research tool by Jose Pino
CyberSeaLOps/uDork
uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or directories, find IoT devices, detect versions of web applications, and so on.
CyberSeaLOps/webcopilot
An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.