AnwarMohamed / SigPloit
☆14Updated 7 years ago
Related projects: ⓘ
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆16Updated 4 years ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆11Updated 5 years ago
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victim…☆14Updated 5 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆32Updated last year
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆17Updated 5 years ago
- ☆17Updated 6 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆12Updated 3 years ago
- Scripts for hacking through wireless network [WiFi]☆23Updated last year
- Metasploit Exploiting Tool For Linux☆22Updated 2 years ago
- Keylogger for ethical hackers☆14Updated 3 years ago
- ☆19Updated 3 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali☆9Updated last year
- Mobile phone PWN tools and scripts☆13Updated 4 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆21Updated 3 years ago
- Network sniffing automation with Bettercap as rogue AP or as client in your network☆22Updated 2 years ago
- beside-ng module for the WiFi Pineapple☆13Updated 5 months ago
- Steal telegram session Bypass 2fa☆16Updated 2 years ago
- GSM hacking tools and scripts☆49Updated 4 years ago
- SigFramework it's a modified version of SiGploit☆14Updated 2 months ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆16Updated 2 years ago
- Anubis 7.0☆24Updated last month
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆43Updated last year
- It's easy to use android botnet work without port forwarding, vps and android studio☆10Updated 2 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆14Updated 4 years ago
- Espia trafico de la red NETSPY.sh ( hackingyseguridad.com )☆20Updated 4 months ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆15Updated 3 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Updated 3 months ago
- Simple MSFVenom Payload Generator☆38Updated last year
- ☆20Updated this week
- 19 Social Media Phishing Pages #phishing #shellphish #phish☆14Updated 3 years ago