Realradioactive's repositories
leakedonline
Search the world's largest dataset of leaked passwords
amass
In-depth attack surface mapping and asset discovery
AndroidMobilePentest101
Pentesting Android Application Course For Kids+ (English and Vietnamese edition)
byob
Botnet bu post-exploitation framework for students, researchers and developers.
chatmonitor
Twitch yayını sırasında tek ekranlı yayıncıların oyun içerisinde chati görebilmesini sağlayan küçük bir araç
DigiSpark-Scripts
USB Rubber Ducky type scripts written for the DigiSpark.
elite-komut-asistan
elite komu asistan sistemi
gophish
Open-Source Phishing Toolkit email için
hcxtools
Portable (that doesn't include proprietary/commercial operating systems) solution for conversion of cap/pcap/pcapng (gz compressed) WiFi dump files to hashcat formats (recommended by hashcat) and to John the Ripper formats. hcx: h = hash, c = convert and calculate candidates, x = different hashtypes
httpx
httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
iOS
Most usable tools for iOS penetration testing
juice-shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
ligolo-ng
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
MobileApp-Pentest-Cheatsheet
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
Nac_Bypass_Agent
This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the responder and tcpdump tools, and run the nbtscan tool.
nuclei
bug bounty için araç
opencti
Open Cyber Threat Intelligence Platform
Quasar
trojan Remote Administration Tool for Windows
realradioactive.github.io
Hasan Ç. yani realradioactive github sayfasıdır
rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon
Retrieval-based-Voice-Conversion-WebUI
Voice data <= 10 mins can also be used to train a good VC model!
searx
Privacy-respecting metasearch engine
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
sherlock
🔎 Hunt down social media accounts by username across social networks
SocialPwned-karmagibi
SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and Twitter to find possible credentials leaks in PwnDB or Dehashed and obtain Google account information via GHunt.
toolss
Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
voice-changer
Realtime Voice Changer
volatility3
ram zararlı yazılım analizi
Windows-Local-Privilege-Escalation-Cookbook
Windows Local Privilege Escalation Cookbook
zphisher
An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !