You can use this tool To do pranks but don't use this tool to harm anyone. Using this tool carelessly will cause a lot of trouble like if someone's phone getting this spam SMS then they can miss some important messages. This Tool can be very useful to delay Some Criminal Activity. To use this tool You must have termux on your android phone. Th…
☆16Aug 8, 2021Updated 4 years ago
Alternatives and similar repositories for XLR8_BOMBER
Users that are interested in XLR8_BOMBER are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Advance Phishing OTP Bypass Tool☆18Sep 6, 2020Updated 5 years ago
- brute force bitcoin brain wallets☆15Oct 7, 2013Updated 12 years ago
- Brute force bitcoin wallets☆10Dec 8, 2022Updated 3 years ago
- Neural agents evolved with Neataptic to seek targets☆21Aug 27, 2017Updated 8 years ago
- Using a RPI 3b+ to create a PT camera accessible through Windows browser and controllable through MQTT☆12Aug 14, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Scorbot Controller☆14Oct 24, 2017Updated 8 years ago
- This is a fork of ClanBomber2, ported to SDL2 with some custom additions☆17Jul 3, 2022Updated 3 years ago
- The description is about to install WishFish tool in Android Termux. WishFish is very easy to hack webcam of your victims mobile.☆16Aug 4, 2020Updated 5 years ago
- Recover your Mozilla passwords with a simple c script☆23Feb 1, 2015Updated 11 years ago
- Alterations and modifications for the Ultrascope Explorer☆13Oct 19, 2020Updated 5 years ago
- A montage of ethical hacking based resources, please ensure you do not upload anything that violates copyright law☆12Nov 29, 2020Updated 5 years ago
- Simple shell script to generate WhatsApp apis☆15Jan 14, 2022Updated 4 years ago
- iOS 12-12.5.6 iCloud Bypass tool. Tethered using checkra1n. Designed by @ios_euphoria on twitter.☆39Dec 11, 2022Updated 3 years ago
- ☆39Apr 15, 2026Updated 2 weeks ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Facebook Bruteforce Password Attack☆23Mar 24, 2022Updated 4 years ago
- nothing☆18Jan 29, 2025Updated last year
- See WiFi Password using Attiny85 Digi-Spark☆19Feb 4, 2022Updated 4 years ago
- A bitcoin wallet brute force cracker using node.js☆33Apr 13, 2016Updated 10 years ago
- Phishing e-mail repository☆36Apr 7, 2020Updated 6 years ago
- Proof-of-work scheme building upon yescrypt and scrypt☆35Jun 15, 2025Updated 10 months ago
- Password/passphrase strength checking and policy enforcement☆48Mar 21, 2026Updated last month
- OSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accu…☆23Jun 12, 2021Updated 4 years ago
- World's fastest and most advanced GPGPU-based password recovery utility☆31Mar 15, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆25May 18, 2021Updated 4 years ago
- ☆21Oct 28, 2017Updated 8 years ago
- Latest FUD GMail phishing webpage generator☆31Jun 27, 2020Updated 5 years ago
- termux.sh is a shell script for termux terminal app in android to install and setup various packages like vim, zsh and their configuratio…☆53Nov 6, 2020Updated 5 years ago
- ☆21May 3, 2020Updated 5 years ago
- Simcard Information Gathering Tool☆33Apr 9, 2026Updated 3 weeks ago
- WhatsApp number bruteforcer. (Ab)uses WhatsApp Web API.☆32Nov 2, 2023Updated 2 years ago
- Faraday's Command Line Interface☆52Feb 12, 2026Updated 2 months ago
- Make custom phishing page with Black-Water you just need to put required in create folder.☆37Apr 27, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Ethical Hacking | Hack every password on any PC with USB | USB Password stealing drive | USB Hacks☆29Apr 9, 2021Updated 5 years ago
- Whatsapp Bomber [Chrome Extension]☆35May 29, 2020Updated 5 years ago
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆100Oct 13, 2025Updated 6 months ago
- Artillery Hornet Firmware☆40Nov 30, 2021Updated 4 years ago
- TCP port scan detection tool☆70May 28, 2022Updated 3 years ago
- Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showe…☆46Dec 29, 2019Updated 6 years ago
- A Realtime Phone Number Location Tracker☆104Jan 14, 2026Updated 3 months ago