Log keystrokes, take screenshots and grab system information from a target host and exfiltrate to Discord and Google Forms.
☆20Jul 25, 2023Updated 2 years ago
Alternatives and similar repositories for BCA-Reaper
Users that are interested in BCA-Reaper are comparing it to the libraries listed below
Sorting:
- Low-level implementations of common networking protocols in Python 3☆11Aug 19, 2022Updated 3 years ago
- Track any ip address with IP-Tracer. IP-Tracer is developed for linux and android terminal like Termux and GNURoot Debian. you can retrie…☆32Apr 2, 2020Updated 5 years ago
- Objective: Crack a Wi-Fi network’s password using a Wi-Fi adaptor with Kali Linux.☆12Dec 21, 2021Updated 4 years ago
- Tool-Store you can easily install most of tool with one click☆36Oct 8, 2020Updated 5 years ago
- Codes for series☆13Aug 15, 2022Updated 3 years ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- Hey, HI Guys.This is a new set of 7 Tools for you by Hackers Colony Official to learn Hacking☆17May 20, 2025Updated 9 months ago
- A script to automatically generate TWRP-compatible device tree from a boot/recovery image☆10Apr 10, 2021Updated 4 years ago
- A Python Script that can DOS or ShutDown WiFI Network☆13Apr 11, 2022Updated 3 years ago
- Wikileaks: kpvz7ki2v5agwt35.onion Silkroad: http://silkroadvb5piz3r.onion/silkroad/home Random but good foum: http://clsvtzwzdgzkjda7.oni…☆11Nov 4, 2015Updated 10 years ago
- World Model for Natural Gas Trade☆10Feb 8, 2018Updated 8 years ago
- Amazon Echo skill to trigger the native Apple Find My iPhone "play sound" feature. Written in Python 3.6 and deploys easily on AWS Lambda…☆13Aug 3, 2021Updated 4 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- Next-gen (SO)und (PRO)cessing: golang native, upscaler, downscaler, transcoder, neural networks, full mem & on-the-fly & streaming.☆14Feb 17, 2025Updated last year
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 6 years ago
- Run any termux package as real root in your ADB shell☆13Dec 31, 2024Updated last year
- ☆10Oct 24, 2022Updated 3 years ago
- Command line tool for navigating git repositories.☆10May 5, 2023Updated 2 years ago
- termux api wrappers for golang☆12Mar 20, 2022Updated 3 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- ☆16Aug 16, 2022Updated 3 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Scripts for scraping the Heavens Above website and putting its information into iCal.☆17Dec 28, 2012Updated 13 years ago
- A tool to BruteForce ssh. An upgraded version of Hydra. Multiple bruteforce options☆11Jul 9, 2022Updated 3 years ago
- Pythonista 2.0 for iOS☆10Sep 9, 2016Updated 9 years ago
- Settings Editor is an Xposed Module that allows you to easily modify your Android Settings app to your likings by adding, editing or remo…☆12Aug 17, 2020Updated 5 years ago
- Reference DHCP client in go☆10Jul 1, 2024Updated last year
- How-to: Pi-Hole + DNSCrypt + Anonymized DNS + Cloudflare DoH Setup on Raspberry Pi 4☆12Apr 1, 2020Updated 5 years ago
- register with termux-api your wifi-stick on your android☆11Dec 18, 2022Updated 3 years ago
- Burp Suite extension to detect Web Cache Deception vulnerabilities, now compatible with the Community Edition. Automates advanced cache …☆16Nov 18, 2025Updated 3 months ago
- ☆20Nov 13, 2025Updated 3 months ago
- Python program for installing many tools automatically☆15Dec 31, 2021Updated 4 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- ☆28Feb 10, 2026Updated 3 weeks ago
- logic programming in elixir☆10Nov 1, 2018Updated 7 years ago
- RyuzakiLib is a downloader tool, ChatGPT Free, FluxAI Free, image generator [PYTHON-BACKEND] all supported☆13Feb 23, 2026Updated last week
- Git-Finder is a tool that searches through public repositories to find sensitive information like password,auth_token, etc uploaded to t…☆12Mar 15, 2020Updated 5 years ago
- A curated list of Awesome Threat Intelligence resources☆10Apr 30, 2018Updated 7 years ago