The Watcher version 5.0
☆19Nov 10, 2017Updated 8 years ago
Alternatives and similar repositories for the-watcher
Users that are interested in the-watcher are comparing it to the libraries listed below
Sorting:
- This tool is embeds an android application with a msfvenom payload by using a embed ruby script it's just make the embeding more easier a…☆11May 3, 2017Updated 8 years ago
- Fake AccessPoint Attack☆31Jul 27, 2018Updated 7 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- Check arbitrary file download vulnerability in the WordPress☆22Feb 21, 2020Updated 6 years ago
- this tool can spy on the devices in the local network devices with many options that can make sniffing on the local network so easy to ma…☆13Apr 20, 2017Updated 8 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Jul 6, 2022Updated 3 years ago
- Script to generate Android App to get all WhatsApp media (images, audios, videos)☆16Sep 19, 2018Updated 7 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- NetHunter android application☆21Nov 4, 2017Updated 8 years ago
- lulz: automated webstalking tool☆54Jun 3, 2016Updated 9 years ago
- A Volatility plugin for finding sqlite database rows☆21Jul 14, 2019Updated 6 years ago
- ☆25May 27, 2024Updated last year
- Recon Dog is an all in one tool for all your basic information gathering needs.☆11Mar 2, 2018Updated 8 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- Light Armoured Recon is a python script designed to automate passive recon. It automates execution of TheHarvester, whois, Robtex.com, Bu…☆40Feb 28, 2018Updated 8 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated last month
- JWT Attack to change the algorithm RS256 to HS256☆34May 8, 2023Updated 2 years ago
- Scrape emails, phone numbers and social media accounts from a website. You can use the found information to gather more information or ju…☆15Dec 6, 2021Updated 4 years ago
- For accessing info of both public and private instagram accounts☆17Aug 29, 2022Updated 3 years ago
- Module to use a Minecraft Server through Metasploit☆10Oct 19, 2013Updated 12 years ago
- A simple ESP8266 script to control a gas fireplace with an Amazon Echo and RF transmitter☆10May 26, 2017Updated 8 years ago
- Find the zone of the mobile number using the suffix code☆14Aug 17, 2022Updated 3 years ago
- ☆14Apr 29, 2021Updated 4 years ago
- ☆11Mar 12, 2024Updated last year
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- d_5tr☆10Aug 26, 2021Updated 4 years ago
- ☆12Jul 13, 2020Updated 5 years ago
- This tool is for pranking your friends😂. It will send messages to your friend on WhatsApp Web automatically at fixed interval (e.g. afte…☆11Apr 12, 2021Updated 4 years ago
- https://github.com/DarkSecDevelopers/HiddenEye.git☆14Apr 27, 2020Updated 5 years ago
- ☆15Mar 17, 2022Updated 3 years ago
- TIBCO Messaging☆18Feb 5, 2026Updated 3 weeks ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- The Sentinel.blog Repository provides automation tools for updating Analytics Rules, Content Hub Solutions, and Workbooks, eliminating re…☆17Updated this week
- Bypassing Iran's intranet by using traffic transfer from Iranian server to abroad☆10Oct 1, 2022Updated 3 years ago
- This python script can help you to detect what object is in moving.☆12Nov 28, 2018Updated 7 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- Boilerplate for deploying glue python shell jobs through shell script. For developers, it will be useful as script can install external l…☆13Oct 29, 2019Updated 6 years ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 3 months ago
- cydia源☆10Mar 20, 2022Updated 3 years ago