Divyansh2512 / interceptor
Python program that denies internet access to a target within a local network...
☆24Updated 3 years ago
Alternatives and similar repositories for interceptor:
Users that are interested in interceptor are comparing it to the libraries listed below
- Discord Scripts☆12Updated 5 years ago
- A Simple Keylogger☆18Updated 6 years ago
- Multi-threaded Instagram account cracker☆17Updated 7 years ago
- Simple password crackers used for salted and unsalted passwords encrypted with MD5, SHA-1, and SHA-256 algorithms.☆15Updated 5 years ago
- ☆15Updated 2 years ago
- Face-recognition using python 2+ opencv☆7Updated 6 years ago
- Scripts for pentesting/hacking☆16Updated 3 years ago
- Full ArchStrike Installer for the ArchStrike ISO☆9Updated 3 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- pen testing scripts☆11Updated 4 years ago
- AIL framework - Analysis Information Leak framework☆8Updated 7 years ago
- BlackArch configuration for the bash shell.☆12Updated 4 years ago
- Reset your Linux password from external pen drive☆19Updated 4 years ago
- Geolocation Spy (GeoSpy) is an OSINT analysis and research tool that is used to track and execute intelligent social engineering attacks …☆19Updated 4 years ago
- [ Multi Encryption / Decryption ]☆20Updated 5 years ago
- Open-source advanced cracking tool made in Electron.JS☆16Updated 4 years ago
- Disposable Mails From Command Line☆31Updated 5 years ago
- Instantly search the web for hacked data. Check if you appear in any database leaks.☆14Updated 6 years ago
- ☆10Updated 4 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆14Updated 4 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too …☆10Updated 3 years ago
- facebook bot ,like comment,download phone number, download email adress, delect all friends ...........etc☆20Updated 5 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Updated 4 years ago
- simple script to pwn android phone with physical access☆23Updated 6 years ago
- An advanced reverse shell written in Python3.☆21Updated 4 years ago
- Password Lense: reveal character types in a password☆23Updated this week
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- The Locator Tool Re-Released For Everyone!!☆17Updated 4 years ago