A URL shortener
☆19Feb 4, 2019Updated 7 years ago
Alternatives and similar repositories for Micro
Users that are interested in Micro are comparing it to the libraries listed below
Sorting:
- A simple site cloner☆27Aug 20, 2017Updated 8 years ago
- A Simple Keylogger☆17Oct 1, 2018Updated 7 years ago
- Secure FTP☆11Jul 28, 2018Updated 7 years ago
- Automatically Scans For Default Networks & Guess The Password☆14Dec 9, 2016Updated 9 years ago
- Disconnects client from router☆14Jul 28, 2017Updated 8 years ago
- A simple Golang program to collect proxies☆13Aug 9, 2019Updated 6 years ago
- A Simple Ransomware☆52Jan 5, 2024Updated 2 years ago
- A Simple Proxy Scraper☆33Mar 18, 2019Updated 6 years ago
- This is not a real botnet, this is suppose to show how botnets work, no virus, just simple python code.☆16Aug 13, 2017Updated 8 years ago
- Inflate YouTube Views☆31May 1, 2018Updated 7 years ago
- Get or generate a password list☆127Jun 22, 2022Updated 3 years ago
- Automatic Wifi Cracker. Uses Airodump, Aircrack, Aireplay☆73Aug 19, 2017Updated 8 years ago
- Using Social Engineering To Obtain WiFi Passwords☆101Jan 12, 2018Updated 8 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Nov 2, 2024Updated last year
- ☆11Mar 26, 2024Updated last year
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆16Nov 11, 2016Updated 9 years ago
- Generate image payloads in JS to bypass filters☆39Mar 16, 2021Updated 4 years ago
- A tool that finds and scan sites for sql injection vulnerability☆163Nov 22, 2019Updated 6 years ago
- Bypass CloudFlare to find real IP address☆19Nov 27, 2018Updated 7 years ago
- A simple DOS attack tool☆14Sep 21, 2019Updated 6 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Oct 13, 2020Updated 5 years ago
- Custom security distro for remote penetration testing☆55Mar 26, 2021Updated 4 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Jan 7, 2018Updated 8 years ago
- Remote Access Tool☆617May 1, 2023Updated 2 years ago
- Collection of popular phishing websites.☆30Aug 24, 2022Updated 3 years ago
- Tool Crack (Smtp - Mail access ) V2.1 (Fixed) & auto send Result to your email Python Script with update !☆32Jun 15, 2019Updated 6 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- Send Bulk fake poll votes with your accounts by this tool.☆12Oct 14, 2025Updated 4 months ago
- Intro to Python programming☆26Jan 31, 2019Updated 7 years ago
- You can create a virus for a Laptop or phone with this command bell☆10Mar 3, 2021Updated 4 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- Evil twin tool.☆36Jul 26, 2021Updated 4 years ago
- CredFlow is a full-stack Loan Management System built using React, Node.js, and MongoDB. The application provides a complete loan lifecy…☆15Dec 30, 2025Updated 2 months ago
- ☆10Aug 9, 2024Updated last year
- An online marketplace that allows users to buy and sell products. Users can register for an account, browse products, add products to the…☆11Feb 18, 2026Updated last week
- An easy & free way to collect sponsorships for your projects.☆11Mar 9, 2023Updated 2 years ago
- ☆13Jun 10, 2022Updated 3 years ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Feb 7, 2026Updated 3 weeks ago