Bhai4You / Metasploit-2Links
Second Edition Metasploit For Termux
☆20Updated 7 years ago
Alternatives and similar repositories for Metasploit-2
Users that are interested in Metasploit-2 are comparing it to the libraries listed below
Sorting:
- Hacking Links On Termux☆35Updated 7 years ago
- Red Widow Spider Tools☆32Updated 3 years ago
- Localhost Server With Termux☆40Updated 3 years ago
- A Tool For Termux Users☆29Updated 4 years ago
- All-in-One WebSploit Installer for Android Devices (Termux) Created by @Voldemort1912☆13Updated 6 years ago
- Find GeoLocation with High Accuracy...☆28Updated 6 years ago
- https-server for Termux ( Node.js )☆15Updated 7 years ago
- ☆16Updated 6 years ago
- Termux Auto-Metasploit☆64Updated 3 years ago
- A script to install the metasploit-framework automatically or without hassle and errors.☆41Updated 7 years ago
- Android Application For Termux User ( India )☆12Updated 7 years ago
- Cookies Stealer Script For Termux !!!☆32Updated 5 years ago
- Powerful Malware for Termux ;)☆18Updated 3 years ago
- Dark tool for Termux :v☆22Updated 3 years ago
- ☆29Updated 4 years ago
- Androtoolkit can use in termux to create payload , install metasploit & ngrok also :)☆74Updated 7 years ago
- Password Attack Toolkit☆16Updated 6 years ago
- Now you can download the most powerful tools using this simple script☆13Updated 6 years ago
- beyawak tools, this tools for termux pentest☆53Updated 6 years ago
- COLLECTIONOF TERMUX TOOLS FOR NEWBIES☆27Updated 3 years ago
- Termux packages that are only usable by root users.☆25Updated 5 years ago
- Android Hacking Framework to generate apk with backdoor, Works on both WAN and LAN☆20Updated 3 years ago
- This is a shell script that installs most of the termux tools with one key.☆16Updated 7 years ago
- This is the only script to bind payload in termux within a matter of seconds. Now has Port Forwarding feature☆16Updated 6 years ago
- Facebook Hacking Menu☆36Updated 5 years ago
- ☆30Updated 7 years ago
- ☆14Updated last year
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆15Updated 5 years ago
- ute.py - Facebook Brute Force # -*- coding: utf-8 -*- ## import os import sys import urllib import hashlib API_SECRET = "62f8ce9f74b12f…☆18Updated 5 years ago
- This is the official repo for the Jumbo version of John the Ripper. The "bleeding-jumbo" branch (default) is based on 1.8.0-Jumbo-1 (but …☆33Updated 7 years ago