You can use this tool To do pranks but don't use this tool to harm anyone. Using this tool carelessly will cause a lot of trouble like if someone's phone getting this spam SMS then they can miss some important messages. This Tool can be very useful to delay Some Criminal Activity. To use this tool You must have termux on your android phone. Th…
☆16Aug 8, 2021Updated 4 years ago
Alternatives and similar repositories for XLR8_BOMBER
Users that are interested in XLR8_BOMBER are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Advance Phishing OTP Bypass Tool☆18Sep 6, 2020Updated 5 years ago
- brute force bitcoin brain wallets☆15Oct 7, 2013Updated 12 years ago
- Brute force bitcoin wallets☆10Dec 8, 2022Updated 3 years ago
- Neural agents evolved with Neataptic to seek targets☆21Aug 27, 2017Updated 8 years ago
- Using a RPI 3b+ to create a PT camera accessible through Windows browser and controllable through MQTT☆12Aug 14, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Scorbot Controller☆14Oct 24, 2017Updated 8 years ago
- This is a fork of ClanBomber2, ported to SDL2 with some custom additions☆17Jul 3, 2022Updated 3 years ago
- The description is about to install WishFish tool in Android Termux. WishFish is very easy to hack webcam of your victims mobile.☆16Aug 4, 2020Updated 5 years ago
- Recover your Mozilla passwords with a simple c script☆23Feb 1, 2015Updated 11 years ago
- Alterations and modifications for the Ultrascope Explorer☆13Oct 19, 2020Updated 5 years ago
- A montage of ethical hacking based resources, please ensure you do not upload anything that violates copyright law☆12Nov 29, 2020Updated 5 years ago
- Simple shell script to generate WhatsApp apis☆15Jan 14, 2022Updated 4 years ago
- iOS 12-12.5.6 iCloud Bypass tool. Tethered using checkra1n. Designed by @ios_euphoria on twitter.☆39Dec 11, 2022Updated 3 years ago
- ☆38May 12, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Facebook Bruteforce Password Attack☆22Mar 24, 2022Updated 4 years ago
- nothing☆18Jan 29, 2025Updated last year
- See WiFi Password using Attiny85 Digi-Spark☆19Feb 4, 2022Updated 4 years ago
- A bitcoin wallet brute force cracker using node.js☆33Apr 13, 2016Updated 9 years ago
- Phishing e-mail repository☆36Apr 7, 2020Updated 6 years ago
- OSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accu…☆21Jun 12, 2021Updated 4 years ago
- Proof-of-work scheme building upon yescrypt and scrypt☆35Jun 15, 2025Updated 9 months ago
- Password/passphrase strength checking and policy enforcement☆48Mar 21, 2026Updated 2 weeks ago
- World's fastest and most advanced GPGPU-based password recovery utility☆31Mar 15, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆25May 18, 2021Updated 4 years ago
- ☆21Oct 28, 2017Updated 8 years ago
- Latest FUD GMail phishing webpage generator☆31Jun 27, 2020Updated 5 years ago
- termux.sh is a shell script for termux terminal app in android to install and setup various packages like vim, zsh and their configuratio…☆53Nov 6, 2020Updated 5 years ago
- ☆21May 3, 2020Updated 5 years ago
- Simcard Information Gathering Tool☆33Apr 28, 2022Updated 3 years ago
- WhatsApp number bruteforcer. (Ab)uses WhatsApp Web API.☆32Nov 2, 2023Updated 2 years ago
- Faraday's Command Line Interface☆52Feb 12, 2026Updated last month
- Make custom phishing page with Black-Water you just need to put required in create folder.☆37Apr 27, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Ethical Hacking | Hack every password on any PC with USB | USB Password stealing drive | USB Hacks☆29Apr 9, 2021Updated 5 years ago
- Whatsapp Bomber [Chrome Extension]☆35May 29, 2020Updated 5 years ago
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆97Oct 13, 2025Updated 5 months ago
- Artillery Hornet Firmware☆39Nov 30, 2021Updated 4 years ago
- A Realtime Phone Number Location Tracker☆100Jan 14, 2026Updated 2 months ago
- TCP port scan detection tool☆70May 28, 2022Updated 3 years ago
- Remake of Bomberman written in C++ and SFML.☆41Sep 12, 2024Updated last year