Ekultek / HacApt
Package manager for hackers built by hackers
☆35Updated 6 years ago
Alternatives and similar repositories for HacApt:
Users that are interested in HacApt are comparing it to the libraries listed below
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 3 years ago
- Vault 7: CIA Hacking Tools Revealed☆15Updated 7 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- hackpack to go with lazykali on menu application Kali Linux☆28Updated 10 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆22Updated 6 years ago
- Windows Auto Post Exploitation - For ReD Team☆16Updated 5 years ago
- Information gathering tool - OSINT☆33Updated 5 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆31Updated 7 years ago
- Remote Administration Tool for Windows☆17Updated 9 years ago
- ☆19Updated 7 years ago
- web information gathering / Grab links☆42Updated 5 years ago
- Basic python script for detect airdroid users in lan☆47Updated 4 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆51Updated 4 years ago
- Red Team Tool Kit☆15Updated 5 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 8 years ago
- Python - Metasploit-Framework Database Management☆15Updated 4 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆32Updated 8 years ago
- Google Hack Database dork automatic tool.☆25Updated 7 years ago
- 💻 GitClin V1.0 for downloading and installing tools☆15Updated 6 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆45Updated 9 months ago