X_INSTA Powerful INSTAGRAM Password Brute Force Tool For Windows
☆31Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for X_INSTA
Users that are interested in X_INSTA are comparing it to the libraries listed below
Sorting:
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- HashRipper is a powerful and fast multi-threaded ethical hacking tool written in Python for cracking hashes. It supports over 17+ popular…☆22Nov 19, 2025Updated 3 months ago
- Want .uf2 files for your switch hacking needs? ask and link to the .bin payload you want, and I may get to it in my free time. I understa…☆17Feb 4, 2021Updated 5 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 3 years ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- [Phishing Tool]☆17Jul 18, 2025Updated 7 months ago
- Jok3r - Network and Web Pentest Framework☆17Apr 21, 2019Updated 6 years ago
- Enumerate a target Based off of Nmap Results☆76Oct 25, 2023Updated 2 years ago
- La Deep Web puede resultar un asunto muy delicado para aquellos aficionados de la seguridad, mientras que otros no saben ni lo que se pue…☆11Jul 12, 2022Updated 3 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆16Dec 14, 2020Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated last month
- Keylogger for ethical hackers☆13Aug 25, 2021Updated 4 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Jul 21, 2019Updated 6 years ago
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆18Oct 11, 2019Updated 6 years ago
- A python server tool based on flask , this tool can phish some Facebook credentials!☆17Jun 22, 2019Updated 6 years ago
- This is a small framework for generate and listen to Keylogger malwares... And also the most effective and most useful feature about this…☆19Apr 15, 2020Updated 5 years ago
- Collections of way to evade normal detection events.☆23Sep 13, 2020Updated 5 years ago
- DNS isteklerini veya trafiği kendi istediğiniz yere yönlendirerek hedef web sitesini manipüle etmenize yarayan bir script.☆14Jun 24, 2020Updated 5 years ago
- Instagram Bruteforce For Hacking Instagram Accounts☆17Apr 4, 2020Updated 5 years ago
- walterRat Advanced Remote Access Trojan Tool☆20Mar 10, 2020Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- A Reflected / Stored / DOM XSS Scanner based on Headless Chrome Node API via Puppeteer☆40Jan 7, 2023Updated 3 years ago
- Botnet targeting Windows machines 🐍☆46Feb 25, 2026Updated last week
- Android Hacking Framework to generate apk with backdoor, Works on both WAN and LAN☆19Jun 19, 2022Updated 3 years ago
- All In One, Fast, Easy Recon Tool☆88Jun 25, 2022Updated 3 years ago
- ☆23Nov 23, 2019Updated 6 years ago
- Tools for working with files from Danganronpa V3 for PC☆33Jul 30, 2025Updated 7 months ago
- ✔A script that turns off Windows Defender☆23May 21, 2022Updated 3 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- Monitoring Registry and File Changes in Windows☆69Jan 14, 2026Updated last month
- A simple program to quickly and efficiently check accounts on snapchat,☆11Feb 5, 2023Updated 3 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) Remote Adminstration Tools.☆24Jan 1, 2021Updated 5 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆139Oct 3, 2023Updated 2 years ago
- Hydrabus Shield for LIN and CAN Buses☆35Mar 29, 2023Updated 2 years ago
- Journey to Try Harder !!!☆31Aug 30, 2019Updated 6 years ago
- Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif☆40Aug 18, 2020Updated 5 years ago
- Red Team C2 and Post Exploitation code☆35Jul 8, 2025Updated 7 months ago
- Phishing Framework for Facebook, Gmail, Twitter, WiFi, Windows.☆72Feb 5, 2020Updated 6 years ago