D4RKH0R1Z0N / The_Manipulators_Cookbook
The Manipulator's Cookbook, probably almost the only book you'll need to gain power, manipulate a person or a group and contains all kinds of manipulation techniques, propaganda, subjugation, indoctrination all step-by-step, just take good read and provide feedback if possible...
☆7Updated last year
Alternatives and similar repositories for The_Manipulators_Cookbook:
Users that are interested in The_Manipulators_Cookbook are comparing it to the libraries listed below
- All about gaining Power, Influence and Control, manipulation, deception and more...☆13Updated 11 months ago
- Brute force attack on private keys of bitcoin wallet with 12 long seed passphrase☆9Updated 3 years ago
- ☆10Updated 3 years ago
- Cybersecurity and Hacking tools made by Python☆14Updated 3 years ago
- CamJacking is a tool designed for use in human penetration testing tool. It is intended to simulate potential security threats by testing…☆19Updated 10 months ago
- 👽 Metasploit is the most widely used open-source exploitation framework. Learn how to use it and unlock its full potential.☆23Updated last year
- [ igbf ]: Instagram Brute Forcer --easy-to-use --cross-platform --open-source --no-extl-lib-req☆41Updated last month
- 6 digit OTP payload☆16Updated 6 months ago
- Basics on commands/tools/info on how to assess the security of mobile applications☆12Updated last year
- Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,docx,pptx,xlsx) belongi…☆15Updated 10 years ago
- Code repository for WiFi Hacking: Wireless Penetration Testing for Beginners, published by Packt☆15Updated 2 years ago
- USB-Rubber-Ducky-Arduino-New-Payloads☆13Updated 6 years ago
- 🚀An illustration of blockchain/Crypto technology😃 by: Building our own very simple Cryptocurrency (like Bitcoin)/ smart contracts/ Hot …☆11Updated last year
- Enter Bitcoin public address and coressponding private key will be found.☆27Updated 5 years ago
- Bitcoin address balance checker on steroids.☆36Updated last year
- All In One Tools Hacking☆28Updated 5 years ago
- The USB Rubber Ducky is a discrete miniature keyboard that is disguised as a regular USB Storage Device. This page provides the payload …☆16Updated 6 years ago
- Advanced information gathering & OSINT framework for phone numbers☆68Updated 5 years ago
- A collection of scripts to steal BTC from Lightning Network enabled custodial services. Only for educational purpose! Share your findings…☆18Updated 3 years ago
- A collection of awesome penetration testing resources, tools and other shiny things. With repository stars⭐ and forks🍴☆14Updated last week
- 27 ways to bypass 2FA/otp☆42Updated last year
- A rebranded version of our old, beloved Osintgram Client☆34Updated 7 months ago
- Javascript Hacking Code☆52Updated 4 years ago
- This is a selection of ethical hacking courses on video☆18Updated 3 years ago
- ☆14Updated 6 years ago
- terminal customization☆9Updated 2 years ago
- BTCRecover is an open source wallet password and seed recovery tool. For seed based recovery, this is primarily useful in situations wher…☆45Updated last year
- Search breached data on private nodes, darkweb, internet, end-to-end channels☆100Updated 5 years ago
- Raspberry Pi Vending Machine Hack Code☆9Updated 8 years ago
- A tools brute force BTC☆42Updated 7 years ago