RAR-NextgenerationAI-expliot (use ai and more new techniques)
☆22May 5, 2025Updated last year
Alternatives and similar repositories for RAR-NextgenerationAI-expliot
Users that are interested in RAR-NextgenerationAI-expliot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This code implements an Advanced Prompt Hacking Tester, which allows users to test the responses of an AI system by generating various ty…☆13Apr 14, 2024Updated 2 years ago
- This is a tool for installing all packages in Termux and is very useful for those of you who are just using Termux☆16Oct 16, 2025Updated 7 months ago
- This code is a web scanner tool designed to find vulnerabilities and file upload points on a website. It uses various techniques to bypas…☆20May 4, 2025Updated last year
- Remote persistent keylogger for Windows and Linux..☆12Aug 21, 2022Updated 3 years ago
- functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forger…☆93Apr 21, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 🕷️MITMProxy + Ettercap = PWNd☆11Dec 5, 2018Updated 7 years ago
- A tool for injecting custom JavaScript payloads into PDF files for penetration testing and XSS proof-of-concept generation.☆21Jan 10, 2025Updated last year
- Track Location From IP.☆11Dec 25, 2020Updated 5 years ago
- LinkedIn Auto Connect Tool☆12Jan 3, 2021Updated 5 years ago
- Fully Undetected Grabber (Grabs Wallets, Passwords, Cookies, Autofills, Information, Discord, Telegram)☆20Apr 8, 2024Updated 2 years ago
- An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.☆46Apr 19, 2024Updated 2 years ago
- A tool for reverse engineering Android apk files☆13Nov 30, 2018Updated 7 years ago
- Hack instagram using simple bruteforce method ✨☆12Aug 13, 2024Updated last year
- Anti-forensics tool Inspired by NSA's Marble framework.☆10Apr 17, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Simple script to bulk check if IPs match networks☆12Jan 11, 2022Updated 4 years ago
- Xninjaz is a powerful and versatile multi-vulnerability scanner designed to detect various web application vulnerabilities, including Loc…☆11Oct 16, 2025Updated 7 months ago
- Save contacts that you want don't want to show on the dailer. Black Book for saving contacts in python☆11Apr 30, 2023Updated 3 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- kali linux tutorials and commands for ethical hackers and penetration testing☆10Jul 6, 2025Updated 10 months ago
- ProtOSINT is a Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses☆13Sep 2, 2022Updated 3 years ago
- CVE-2024-6387 with auto ip scanner and auto expliot☆11Jul 4, 2024Updated last year
- ☆18Jun 25, 2024Updated last year
- Fake-Out : Fake-Out is an email spoofing tool created by HackEthics138, with security measures provided by Team Illusion. Thi…☆12Aug 19, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Tools for installing Linux distros on Android easily and quickly without any hassle☆11Oct 16, 2025Updated 7 months ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆16Dec 18, 2021Updated 4 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated 2 years ago
- ☆13May 21, 2025Updated 11 months ago
- X-wpbf is a wordpress bruteforce tool to find admin or user passwords via the admin login of the target website☆12Oct 16, 2025Updated 7 months ago
- ☆12Jul 4, 2024Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated 2 years ago
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆105May 5, 2025Updated last year
- Bullet-proof your custom GPT system prompt security with KEVLAR, the ultimate prompt protector against rules extraction, prompt injection…☆20Apr 12, 2024Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A Magic Mask to Alter Android System Systemless-ly☆15Jan 1, 2024Updated 2 years ago
- Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан дл…☆12May 29, 2024Updated last year
- Crypto trading assistant that uses sentiment analysis on scraped web data to provide analysis. Feel free to fork and test☆15Feb 2, 2018Updated 8 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.☆15Mar 7, 2024Updated 2 years ago
- A high-performance domain scanner that discovers active domains by testing multiple Top-Level Domains (TLDs) for given domain names.☆32Apr 20, 2026Updated last month
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated 2 years ago