AnwarMohamed / SigPloit
☆15Updated 7 years ago
Alternatives and similar repositories for SigPloit:
Users that are interested in SigPloit are comparing it to the libraries listed below
- Learn the most common Threats in mobile technology, Learn how to build your own IMSI catcher, and more!☆19Updated last year
- simple ss7 & imsi catcher & kraken☆18Updated 2 years ago
- Automated Password Cracking Tool☆15Updated 4 years ago
- ☆17Updated 7 years ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆18Updated 6 years ago
- Mobile phone PWN tools and scripts☆14Updated 4 years ago
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆11Updated 2 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali☆9Updated 2 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆14Updated 4 years ago
- script to brute force ssh or ftp passwords☆12Updated 8 years ago
- 19 Social Media Phishing Pages #phishing #shellphish #phish☆14Updated 4 years ago
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victim…☆16Updated 5 years ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Updated 6 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆36Updated 2 years ago
- 🔥Ready, Aim, Fire.🔥☆15Updated 2 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- How to make a simple IMSI Catcher (Credit: Keld Norman)☆29Updated 6 years ago
- Keylogger for ethical hackers☆14Updated 3 years ago
- Metasploit Exploiting Tool For Linux☆22Updated 3 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆15Updated 3 years ago
- Locating Roaming location of a number, and collecting msisdn and opeartor related infromation (IMSI, HLR GT, MSC GT)☆79Updated 6 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆18Updated 4 years ago
- Network sniffing automation with Bettercap as rogue AP or as client in your network☆25Updated 2 years ago
- Complete and modifyable ransomware program☆11Updated 4 years ago
- ☆22Updated 4 years ago
- It's easy to use android botnet work without port forwarding, vps and android studio☆10Updated 3 years ago
- Fast subdomains enumeration tool for penetration testers☆17Updated 5 years ago
- E-ntel is a tool gathering email accounts informations (ip,hostname,country,...) from different public source (search engines, pgp key se…☆29Updated 6 years ago