Git Product home page Git Product logo

sofien elkamel's Projects

signoz icon signoz

SigNoz helps developers monitor their applications & troubleshoot problems, an open-source alternative to DataDog, NewRelic, etc. ๐Ÿ”ฅ ๐Ÿ–ฅ. ๐Ÿ‘‰ Open source Application Performance Monitoring (APM) & Observability tool

slient-doc-pdf-exploit-builder-fud-malware-cve icon slient-doc-pdf-exploit-builder-fud-malware-cve

Vulnerability Disclosure Timeline Closer inspection of the Exploit PDF content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit PDF from Python encrypted code content which we also implement in couple of our builders.

smsme icon smsme

User Friendly Tool can help to be anonymous in the internet, the tool provide more than 160 numbers to use OTP codes for temporary accounts

sn0int icon sn0int

Semi-automatic OSINT framework and package manager

social-engineer-toolkit icon social-engineer-toolkit

The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.

socialbox icon socialbox

SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi

socialpwned icon socialpwned

SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and Twitter to find possible credentials leaks in PwnDB.

spree icon spree

Spree is an open source E-commerce platform for Rails 6 with a modern UX, optional PWA frontend, REST API, GraphQL, several official extensions and 3rd party integrations. Over 1 million downloads and counting! Check it out:

squidnet icon squidnet

A highly functional Botnet with security, powerful bot scripts, and the ability to set up remote access to it with admin scripts. It also has a dynamic-web-interface(but I'm not too good at HTML so it looks bad :/ ). It is mainly using TCP for regular bots, but it can use SSH when logging into SSH Servers.

ssh-mitm icon ssh-mitm

ssh mitm server for security audits supporting public key authentication, session hijacking and file manipulation

steal_ps icon steal_ps

steal chrome saved passwords "undetectable"

storm-breaker icon storm-breaker

Tool social engineering [Access Webcam & Microphone & Os Password Grabber & Location Finder] With Ngrok

subplayer icon subplayer

:memo: SubPlayer is a online subtitle editor

sudomy icon sudomy

Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting

superwordlist icon superwordlist

ๅŸบไบŽๅฎžๆˆ˜ๆฒ‰ๆท€ไธ‹็š„ๅ„็งๅผฑๅฃไปคๅญ—ๅ…ธ

swiss_tht icon swiss_tht

Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science

th3inspector icon th3inspector

Th3Inspector ๐Ÿ•ต๏ธ Best Tool For Information Gathering ๐Ÿ”Ž

thefatrat icon thefatrat

Thefatrat Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool have ability to bypass most AV software protection .

tinycheck icon tinycheck

TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs). In order to make it working, you need a computer with a Debian-like operating system and two Wi-Fi interfaces. The best choice is to use a Raspberry Pi (2+) a Wi-Fi dongle and a small touch screen. This tiny configuration (for less than $50) allows you to tap any Wi-Fi device, anywhere.

tmpmail icon tmpmail

A temporary email right from your terminal written in POSIX sh

torat icon torat

ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication

toutatis icon toutatis

Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails, phone numbers and more

tphisher icon tphisher

An automated phishing tool with templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.