Bitwise-01 / Micro
A URL shortener
☆18Updated 5 years ago
Related projects: ⓘ
- A simple site cloner☆23Updated 7 years ago
- ☆38Updated this week
- A Simple Keylogger☆18Updated 5 years ago
- A simple phishing tool that can phish almost any website☆72Updated 5 years ago
- hashcrack is a python script which uses online hash crackers to find cleartext of a hash in less than 3 seconds☆45Updated 6 years ago
- Discord Scripts☆11Updated 4 years ago
- Auxile Framework☆28Updated 3 years ago
- Most advanced framework yet! From spoofing to cryptography, Trity has it all!☆41Updated 7 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆23Updated 5 years ago
- Automatically Scans For Default Networks & Guess The Password☆14Updated 7 years ago
- ☆25Updated this week
- Send an email via gmail using python☆8Updated 5 years ago
- ☆45Updated this week
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆47Updated 6 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆21Updated 3 years ago
- PHP SMS Sender Only Script And API☆26Updated 6 years ago
- ☆24Updated this week
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆60Updated 4 years ago
- ☆17Updated this week
- Keylogger for ethical hackers☆14Updated 3 years ago
- ☆40Updated this week
- Basic python script for detect airdroid users in lan☆46Updated 3 years ago
- Simple bulk email sender and filter☆17Updated 4 years ago
- SHELL SCANNER☆18Updated 5 years ago
- A simple vuln web scanner☆39Updated 6 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆42Updated last year
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆52Updated 3 years ago
- There are three ways to create an email bomb Mass mailing☆59Updated 2 years ago
- Social Media Phisher☆17Updated 5 years ago
- You can get cc from hear coded by cyber kallan☆19Updated 4 years ago