C# .Net Framework scambait toolkit. Replacements for standard Windows programs with a little extra added ;)
☆38Apr 17, 2024Updated 2 years ago
Alternatives and similar repositories for ScambaitToolkit
Users that are interested in ScambaitToolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DSJAS: Dave Smith Johnson & son. A fake bank for baiting scammers attempting to steal from online banking.☆88Aug 12, 2025Updated 8 months ago
- Various tools to aid with scambaiting☆12Dec 2, 2018Updated 7 years ago
- A compilation of scambaiting resources☆22Jun 6, 2022Updated 3 years ago
- Tools for baiting phone-tech-support-scammers☆23Apr 20, 2020Updated 6 years ago
- My tools for scambaiting.☆24Apr 9, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Bait bank created for scambaiting☆32May 28, 2020Updated 5 years ago
- A full setup guide for scam-baiting with Oracle's VirtualBox.☆361Feb 19, 2022Updated 4 years ago
- Mirror of Kitboga's fake bank account repository on BitBucket, please submit new themes there!☆45Mar 30, 2020Updated 6 years ago
- ☆12Feb 14, 2023Updated 3 years ago
- Vault 7: CIA Hacking Tools Revealed☆17Mar 8, 2017Updated 9 years ago
- For scambaiters to have some fun☆14Mar 6, 2017Updated 9 years ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- A curated list of awesome threat detection and hunting resources☆20Apr 13, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- WikiLeaks Vault 7 CIA Hacking Tools☆25Sep 20, 2020Updated 5 years ago
- A list of bitcoin addresses being used in Ransomware and Sextortion Scams☆18Jul 4, 2021Updated 4 years ago
- MS Graph Commands and Tools for Blue Teamers☆51Feb 4, 2026Updated 3 months ago
- Flipper zero payloads for IOS devices.☆14May 29, 2023Updated 2 years ago
- Take webcam snaps by sending malicious link☆13Jun 9, 2020Updated 5 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- Plex Remote Transcoder Dockerized☆12May 16, 2016Updated 9 years ago
- Fetch information about a public Google document.☆13Aug 4, 2023Updated 2 years ago
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Discord bot to help you find a good username for YouTube, Twitter, Tiktok, Discord and more.☆14Mar 18, 2024Updated 2 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- Ruby script for spoofing SMTP emails.☆46Feb 16, 2023Updated 3 years ago
- Shamir Secret Sharing for Nim☆10May 28, 2021Updated 4 years ago
- 3D printed mini circular table saw.☆11Jul 19, 2014Updated 11 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆17Aug 20, 2023Updated 2 years ago
- exploitpack extracted from a honeynet which is being prepared by intruduers to be used as an exploitation infrastructure☆12Feb 17, 2022Updated 4 years ago
- Lists of Dynamic DNS Domains/FQDNs as well as lists of services/providers that offer free dynamic dns domains.☆13Nov 2, 2021Updated 4 years ago
- A modern Python library for handling files and formats used by the Wii.☆16Mar 31, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Tools that i have gatherd and study to see how thay work and learned why theses tools execute there attacks. I started to have the intres…☆11Dec 25, 2020Updated 5 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 9 years ago
- MEMEX Weapons Pilot for the illegal weapons domain.☆15May 20, 2016Updated 9 years ago
- A web browser extension for accessing I2P network anonymously☆14Mar 31, 2026Updated last month
- Wordlists generated over the years of penetration testing☆13Mar 18, 2025Updated last year
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆89Jun 11, 2018Updated 7 years ago