9aylas / Backdooring-ZMM100-FingerPrint-DevicesLinks
AuthBypass & Auto Backdooring Devices
☆16Updated 6 years ago
Alternatives and similar repositories for Backdooring-ZMM100-FingerPrint-Devices
Users that are interested in Backdooring-ZMM100-FingerPrint-Devices are comparing it to the libraries listed below
Sorting:
- Repository of tools used in my blog☆51Updated last year
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 5 years ago
- All Zero Day Exploits☆20Updated 8 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 3 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 6 years ago
- Apple wireless research and tools☆19Updated 5 years ago
- ☆15Updated 3 years ago
- Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )☆12Updated 2 years ago
- Automated Mass Exploiter☆11Updated 6 years ago
- HTTP botnet☆60Updated 9 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆78Updated 2 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 5 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆33Updated 9 years ago
- GhostSec Scam Detection Tool☆15Updated 4 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 4 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆17Updated 4 years ago
- PHP Script intdended to be used during Phishing campaigns as a credentials collector linked to backdoored HTML <form> action parameter☆61Updated 3 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15Updated 5 years ago
- Anubis 7.0☆27Updated last year
- first program python to steal password microsoft edge all version browser, send info to email☆13Updated 4 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) Remote Adminstration Tools.☆25Updated 4 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆14Updated 3 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 6 years ago
- Python - Metasploit-Framework Database Management☆16Updated 5 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Updated 7 years ago
- This is a simple tool for openbullet configs☆23Updated 4 years ago
- Simple Wi-Fi Keylogger with multiple layout support.☆27Updated 6 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆25Updated 6 years ago