AzizKpln / Whistleye_Project
This project is a continuation of the Moriarty project. But this osint website, has more feautres than Moriarty has
β33Updated 4 years ago
Alternatives and similar repositories for Whistleye_Project:
Users that are interested in Whistleye_Project are comparing it to the libraries listed below
- Hacking Tools For All Debian-based OSβ51Updated 7 years ago
- !!!WORLD'S π #1π₯ TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most toβ¦β46Updated 2 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .β45Updated 6 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.β23Updated 4 years ago
- πsα΄α΄Ιͺα΄Κ α΄α΄α΄ Ιͺα΄ Κα΄α΄α΄α΄α΄πβ25Updated 3 years ago
- Best social media phishingβ23Updated 4 years ago
- π₯Ready, Aim, Fire.π₯β16Updated 2 years ago
- Information gathering tool - OSINTβ35Updated 6 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.β76Updated 4 months ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be usβ¦β52Updated 7 years ago
- β32Updated 11 months ago
- Get files from Android directoriesβ11Updated 6 years ago
- Search for leaked creadentials on pwndb using the command line and tor.β24Updated 6 years ago
- SQLi Google Dork Scanner (new version)β16Updated 3 years ago
- A Windows Tool for doing OSINT investigations on a Facebook Profileβ66Updated 7 years ago
- Evilip Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Eβ¦β30Updated 2 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!β67Updated 2 years ago
- Information Gathering & WebSite ReConnaissance.β22Updated 7 years ago
- forked from linux choiceβ21Updated 5 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)β18Updated 2 years ago
- WIP - Chromium plugin for PhoneInfoga's Google Search scannerβ80Updated 3 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentesβ¦β11Updated last year
- Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,docx,pptx,xlsx) belongiβ¦β15Updated 10 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.β37Updated 2 years ago
- β19Updated 6 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security hβ¦β15Updated 3 years ago
- Bypass Two-Factor-Authenticationβ40Updated 7 years ago
- simple script to pwn android phone with physical accessβ24Updated 6 years ago
- Silently logs and E-mails all incoming/outgoing calls and text messages while doubling up as a flashlight app. The app also has the abiliβ¦β21Updated 4 years ago
- It's easy to use android botnet work without port forwarding, vps and android studioβ10Updated 3 years ago