AnwarMohamed / SigPloit
☆16Updated 8 years ago
Alternatives and similar repositories for SigPloit
Users that are interested in SigPloit are comparing it to the libraries listed below
Sorting:
- ☆17Updated 7 years ago
- Learn the most common Threats in mobile technology, Learn how to build your own IMSI catcher, and more!☆20Updated last month
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆37Updated 2 years ago
- ☆19Updated 6 years ago
- simple ss7 & imsi catcher & kraken☆20Updated 3 years ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- Hacking tool that initiates ip grabbing, scanning the IP then exploiting the possible vulnerabilities present in that IP address.☆11Updated 4 years ago
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆12Updated 3 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆16Updated 4 years ago
- ☆10Updated 5 months ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- A Python script to hack parrot drones automatically. It allows to spawn a shell on the drone to control it.☆13Updated 6 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Updated 6 years ago
- ☆21Updated 5 months ago
- This program shows you IMSI , TMSI, LAC, CI of cellphones around you. This program was made to understand how GSM network works. Understa…☆34Updated 3 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆68Updated 2 years ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆18Updated 6 years ago
- Keylogger for ethical hackers☆15Updated 3 years ago
- Packet injection for wifi; simplified.☆36Updated 2 years ago
- Steal telegram session Bypass 2fa☆18Updated 2 years ago
- Automated Password Cracking Tool☆17Updated 4 years ago
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victim…☆16Updated 5 years ago
- This program scans your network and finds mac addresses,ip addresses and company names of the devices☆11Updated 5 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 4 years ago
- Scripts for hacking through wireless network [WiFi]☆23Updated 2 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆46Updated 2 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali now with windows support☆9Updated 2 months ago
- Python Backdoor Obfusctor, Encrypter and Encoder☆16Updated 6 years ago