CRO-THEHACKER / v1ew-s0urceView external linksLinks
v1ew-s0urce a recon tool built by the 5/9Dark team.
☆92Feb 27, 2021Updated 4 years ago
Alternatives and similar repositories for v1ew-s0urce
Users that are interested in v1ew-s0urce are comparing it to the libraries listed below
Sorting:
- A simple phishing tool that can phish almost any website☆76Nov 6, 2018Updated 7 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- wifisky Python script for pentesting wireless networks☆103Aug 28, 2019Updated 6 years ago
- Slides and stuffs of the meetings during the 2018☆13Jan 18, 2022Updated 4 years ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Aug 5, 2017Updated 8 years ago
- Collection of F-Droid repositories☆17Nov 23, 2023Updated 2 years ago
- Web-See is Tool For Checkout Status Of Urls in Mass Its For Bug Bounty Hunters And Black Hat Hackers It Will Save Your Valuable Time Scr…☆15Jun 25, 2022Updated 3 years ago
- Maltego Local Transforms for truepeoplesearch.com☆12Jun 5, 2017Updated 8 years ago
- Powerful advanced web platform for C2 managing and automated penetration testing.☆15Jun 30, 2023Updated 2 years ago
- Crack ios Restriction PassCode in Python☆38Sep 30, 2020Updated 5 years ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆12Dec 27, 2018Updated 7 years ago
- android CI☆12Feb 25, 2021Updated 4 years ago
- A Simple Ransomware☆52Jan 5, 2024Updated 2 years ago
- MEMEX Weapons Pilot for the illegal weapons domain.☆15May 20, 2016Updated 9 years ago
- ☆19Aug 17, 2018Updated 7 years ago
- Beacon is a Pretty Basic Program to help you Learn how Remote Access tools work.☆14Nov 10, 2018Updated 7 years ago
- Halachic Times☆16Oct 28, 2025Updated 3 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Apr 3, 2021Updated 4 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Dec 29, 2025Updated last month
- Reverse shell using socket programming in python☆15Dec 8, 2022Updated 3 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 3 years ago
- Python Backdoor Obfusctor, Encrypter and Encoder☆18Nov 5, 2018Updated 7 years ago
- Instagram Kit Using PHP [Login + Checker + Brute Force + Turbo + Scanner Emails(taken or no)]☆37Sep 12, 2017Updated 8 years ago
- Python backdoor that uses http post/get requests to communicate☆42Aug 24, 2016Updated 9 years ago
- Helping my friend with her economics research project by scraping drug information from DarkWeb using selenium and Tor☆18Mar 12, 2020Updated 5 years ago
- Cyber security bot for Discord Hack Week 2019☆13Mar 26, 2021Updated 4 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 7 years ago
- Facebook Hacking Tools☆33Jul 8, 2019Updated 6 years ago
- Collection of various wordlists☆36May 11, 2019Updated 6 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from …☆109Dec 13, 2022Updated 3 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Massive arsenal of hacker tools...☆79Oct 30, 2017Updated 8 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Feb 11, 2018Updated 8 years ago
- A python server tool based on flask , this tool can phish some Facebook credentials!☆17Jun 22, 2019Updated 6 years ago
- Metasploit Modules from Mastering Metasploit Book☆20May 23, 2018Updated 7 years ago