D4Vinci / pwndbLinks
Search for leaked creadentials on pwndb using the command line and tor.
☆24Updated 6 years ago
Alternatives and similar repositories for pwndb
Users that are interested in pwndb are comparing it to the libraries listed below
Sorting:
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 5 years ago
- SMS Phishing Tools☆80Updated 8 years ago
- Python script that will extract all saved passwords from your google chrome database on windows only☆79Updated 5 years ago
- A simple phishing tool that can phish almost any website☆79Updated 7 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆54Updated 4 years ago
- A tool to harvest credentials from leaked data dump☆77Updated 3 years ago
- SQLi Google Dork Scanner☆59Updated 3 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Updated 9 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆86Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆57Updated 7 years ago
- Priv8 Image Capturing through Network Based On Driftnet☆24Updated 7 years ago
- A simple python script to grab twitter account info just by username or profile link☆52Updated 8 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 5 years ago
- Package manager for hackers built by hackers☆37Updated 7 years ago
- Information gathering tool - OSINT☆39Updated 6 years ago
- wifi attacks suite☆60Updated 5 years ago
- Python util to retrieve full display name and profile picture from a single email address☆103Updated 4 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆35Updated 7 years ago
- A python tool that will extract exif data from picture with two methods☆38Updated 3 years ago
- Kill Any Antivirus Using Python For Windows Users .☆47Updated 9 years ago
- website admin panel finder☆34Updated 4 years ago
- CyberScan☆27Updated 7 years ago
- Simple Email/MMS spoofer included mass mail attack feature and a compatible mobile version☆22Updated 7 years ago
- A multithreaded rewrite of the classic theHarvester email address collection script.☆53Updated 2 months ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆44Updated 6 years ago
- Random scripts I write to automate non-hacking stuff☆23Updated 6 years ago
- Wi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks☆58Updated 7 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆63Updated 5 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆39Updated 7 years ago
- python remote access trojan☆38Updated 8 years ago