☆13Apr 30, 2023Updated 2 years ago
Alternatives and similar repositories for Hunner
Users that are interested in Hunner are comparing it to the libraries listed below
Sorting:
- ☆13May 20, 2023Updated 2 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools☆60Nov 30, 2022Updated 3 years ago
- Infect Android Phone☆10Jun 21, 2023Updated 2 years ago
- ☆10Apr 27, 2025Updated 10 months ago
- checks various security features of a system, including firewall, intrusion detection system (IDS),Intrusion Prevention Systems (IPS), Ne…☆11Feb 21, 2023Updated 3 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- An open-source .NET Ransomware☆24Aug 2, 2021Updated 4 years ago
- ☆10Apr 2, 2023Updated 2 years ago
- Tool Bash para automatizar y penetrar fallas de SQL en sitios webs.☆28Jun 4, 2025Updated 8 months ago
- ☆26Dec 15, 2023Updated 2 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Nov 10, 2020Updated 5 years ago
- ☆17Sep 4, 2021Updated 4 years ago
- A powerful password Brute Force password cracker for pentesting.☆41Feb 24, 2022Updated 4 years ago
- DEDSEC-VPN is a Linux-based VPN tool that hides your real IP and blocks IPv6 leaks.☆31Feb 21, 2026Updated last week
- Fake-sms☆27Jun 21, 2025Updated 8 months ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Aug 4, 2020Updated 5 years ago
- Wifi network scanning tool for capturing WPA/WPA2 Handshakes☆27Jan 19, 2021Updated 5 years ago
- IP and geolocation tracking tool☆61Oct 3, 2024Updated last year
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 3 years ago
- Attacks for Router tool☆123Feb 5, 2026Updated 3 weeks ago
- Disconnect all WiFi clients with dedsec tool, you can easily disconnect all WiFi clients from a network. anonymouse mode feature (random …☆22Jun 30, 2024Updated last year
- Advanced, Light Weight & Extremely Fast MD5 Cracker/Decoder/Decryptor written in Python 3☆25Jan 10, 2021Updated 5 years ago
- An Automated Database Hacking Software with Database Dorks Hacking☆30Sep 7, 2019Updated 6 years ago
- This is a multipurpose tool which is useful in networking or network hacking.☆85Apr 15, 2023Updated 2 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆16Dec 23, 2024Updated last year
- rwwwshell: Getting a reverse shell with Mr. Robot ;)☆36Jul 16, 2020Updated 5 years ago
- ☆13Sep 7, 2023Updated 2 years ago
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆51May 1, 2025Updated 9 months ago
- Obtain the passphrase of a private key (id_rsa), this tool uses the ssh-keygen binary to perform a brute force attack until a successful …☆85Jun 20, 2025Updated 8 months ago
- W3b0s1nt (WebOSINT) is a Python tool/script for passive Domain Intelligence gathering.☆268Dec 16, 2022Updated 3 years ago
- 🌐🔍 Red Network Tool is a tool for network exploration and info finding.☆41Mar 26, 2022Updated 3 years ago
- Quasar : An Information Gathering Framework For Lazy Penetration Testers☆162May 4, 2021Updated 4 years ago
- A multi-functional toolkit for social engineering, phishing, email spoofing, SMS/OTP bombing, keylogging, and security audits — built for…☆22Dec 14, 2025Updated 2 months ago
- Articles to share☆14Mar 26, 2023Updated 2 years ago
- Facebook bot dumper&scraper☆39Oct 13, 2024Updated last year
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆43Aug 5, 2022Updated 3 years ago
- An Raspberry PI 2 OpenWRT Image Setup To Be A Wireless Hacking Sandbox☆38Oct 9, 2015Updated 10 years ago
- A tool that automates fileless SSH backdoor injection—bypassing CA checks, erasing logs, creating long‑lived (up to 9999 days) passwordle…☆27Jan 30, 2026Updated last month