Automatiza la obtención del handshake para crakearlo después y tambn tiene la función de Dos
☆23Jul 10, 2023Updated 2 years ago
Alternatives and similar repositories for venom-wifi
Users that are interested in venom-wifi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- En este repositorio podemos encontrar una cantidad de virus para android y Windows programados en Python☆12Jun 27, 2022Updated 3 years ago
- Tool made to inject malicious code inside a legitimate apk in order to gain access to the infected device.☆18Jul 21, 2024Updated last year
- Esta es una herramienta creada en bash la cual contiene la mayoria de paquetes basicos de termux ademas de un tool de una gran cantidad d…☆19Sep 3, 2022Updated 3 years ago
- 🦀 RUSTVERSARY: A comprehensive repository of tools and scripts for malware development practices.☆29May 10, 2024Updated last year
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- XERXES la herramienta Ddos más potente.☆13May 7, 2022Updated 3 years ago
- ☆19Jun 21, 2025Updated 9 months ago
- This is to reorganize my notes☆10Apr 26, 2021Updated 4 years ago
- 🔐 EntroPy Password Generator A powerful Python-based password generator with 20+ modes, producing high-entropy passwords (15–128 chars, …☆20Nov 23, 2025Updated 4 months ago
- ☆15Jan 2, 2026Updated 3 months ago
- All Exploit List Made By Me☆17Apr 7, 2025Updated last year
- Git Source Code Mirror☆15Apr 25, 2025Updated 11 months ago
- This script is designed to analyze network traffic captured in a .pcap file using the pyshark library. // Este script está diseñado para …☆10Feb 8, 2025Updated last year
- Search Tinder Users With Filters☆15Jul 26, 2025Updated 8 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- the venom framework is a framework made in ruby filled with tools for wireless hacking, normal terminal commands, metasploit payloads and…☆19Jun 6, 2019Updated 6 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . …☆16Sep 13, 2019Updated 6 years ago
- Revision tracking for various dotfiles☆17Mar 28, 2021Updated 5 years ago
- ☆12Nov 21, 2022Updated 3 years ago
- Working files for the Docker and Kubernetes course from Udemy taught by Stephen Grider (StephenGrider)☆13Jan 25, 2023Updated 3 years ago
- A Python-based simulation of a secure, anonymous, and verifiable voting system built on blockchain principles using commutative encryptio…☆24Sep 15, 2025Updated 7 months ago
- Files used in my refind theme☆16Jun 7, 2023Updated 2 years ago
- Night falls in Tokyo☆11Jul 5, 2023Updated 2 years ago
- HackTheBox: Certified Bug Bounty Hunter's Writeup by Hung Thinh Tran☆14May 27, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Awesome tips for Laravel☆13Jul 9, 2023Updated 2 years ago
- Votem's Proof of Vote® protocol whitepaper☆23Oct 1, 2018Updated 7 years ago
- Python ejemplos de software, codigos basicos, uso de librerias y codigos relacionados a la Ciberseguridad. Codigo python, Python codes, …☆18Apr 8, 2026Updated last week
- Code from the Stephen Grider React Native course on Udemy at https://www.udemy.com/course/the-complete-react-native-and-redux-course☆12Apr 10, 2026Updated last week
- My program configuration files, stored in a git bare repo☆11Jan 12, 2024Updated 2 years ago
- CVE-2023-4911☆18Oct 11, 2023Updated 2 years ago
- Really light React-Native package to handle fallback when image is on error☆28Jan 4, 2023Updated 3 years ago
- Python implementations of the Udemy course by Andrei Neagoie☆13Jul 8, 2020Updated 5 years ago
- An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.☆19May 12, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆20Oct 25, 2023Updated 2 years ago
- Welcome to our Microservices Project! 🚀 Explore a modern architecture for a hotel management system, built using Spring Boot and Spring …☆18Oct 31, 2023Updated 2 years ago
- ☆20May 28, 2024Updated last year
- ☆13Aug 22, 2022Updated 3 years ago
- I have got many JS games. This one is perfect game.☆45Sep 17, 2025Updated 7 months ago
- ☆18Feb 7, 2023Updated 3 years ago
- ☆27Apr 24, 2025Updated 11 months ago