☆11Dec 17, 2024Updated last year
Alternatives and similar repositories for LECELOSINT
Users that are interested in LECELOSINT are comparing it to the libraries listed below
Sorting:
- OSINT tool for username, email and domains☆31May 19, 2024Updated last year
- nathack☆12Oct 13, 2023Updated 2 years ago
- Generate free Amazon, Paypal, Google play, PlayStation gift codes.☆11Feb 20, 2022Updated 4 years ago
- Aura-sec is a simple, fast, and extensible network port scanner built with Python. Designed for security professionals, students, and ent…☆22Updated this week
- bot net ufonet con ia☆12Jul 7, 2024Updated last year
- An OSINT tool for IT ninjas.☆11Jul 31, 2024Updated last year
- Opencart Bruteforce and Upload Image☆11Aug 13, 2019Updated 6 years ago
- Xninjaz is a powerful and versatile multi-vulnerability scanner designed to detect various web application vulnerabilities, including Loc…☆11Oct 16, 2025Updated 4 months ago
- RANSOMWARE BUILDER FOR WINDOWS☆10Feb 26, 2024Updated 2 years ago
- A collection of hardware Trojans (HTs) automatically generated by Large Language Models (GPT-4, Gemini-1.5-pro, and LLaMA3) targeting SRA…☆11Oct 8, 2025Updated 4 months ago
- Automate buying Amazon Gift Cards☆10Jan 15, 2019Updated 7 years ago
- OSINT Framework for Skype☆15Apr 28, 2022Updated 3 years ago
- Net Commander supercharges Visual Studio Code for Network Engineers, DevOps Engineers and Solution Architects streamlining everyday workf…☆24Feb 19, 2026Updated last week
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- Terminal YouTube downloader☆11Feb 13, 2020Updated 6 years ago
- This Script will help you to gather information about your victim or friend☆15Jan 30, 2021Updated 5 years ago
- Auto CMS detector☆11Dec 29, 2017Updated 8 years ago
- Short Programs For Spreading Malware☆16Aug 11, 2021Updated 4 years ago
- Tool to hide data in untouched sectors of hard disks and flash drives☆15Apr 6, 2019Updated 6 years ago
- ☆16Feb 12, 2022Updated 4 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆62Jun 4, 2022Updated 3 years ago
- ATOP formally A ton of Privacy, a swissarmyknife for investigations on TON blockchain.☆24Jul 29, 2024Updated last year
- ☆14Oct 26, 2024Updated last year
- ☆15Dec 2, 2025Updated 3 months ago
- backdoor exploit for vsftpd 2.3.4 on python☆16Oct 14, 2023Updated 2 years ago
- AI-powered intelligence platform aggregating breakthroughs in neurotech and BCI. Built with Next.js, ChatGPT API, and TypeScript.☆22Feb 11, 2026Updated 2 weeks ago
- ☆14Feb 17, 2022Updated 4 years ago
- amazon giftcard generator + Checekr☆17Mar 31, 2024Updated last year
- A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies, allowing remote code execution through fo…☆19Nov 21, 2025Updated 3 months ago
- Red Tools 渗透测试☆15May 30, 2022Updated 3 years ago
- Osint разведка. Позволит найти очень много информации по номеру, айпи, торренту, по номеру машины. Вообщем Осинт) Также советую подписать…☆39Jan 26, 2021Updated 5 years ago
- Best Hacking Tools For Termux☆16Nov 8, 2018Updated 7 years ago
- GhostHunter is a powerful and user-friendly tool designed to uncover hidden treasures from the Wayback Machine. It allows you to search f…☆20Nov 30, 2025Updated 3 months ago
- GNURadio LimeSDR Mini Examples☆27Dec 17, 2019Updated 6 years ago
- Instagram hacks: Track unfollowers, Increase your followers, Download Stories, etc☆25Mar 16, 2019Updated 6 years ago
- PoC Hacking Tool Contains so many stuff like hash cracking, Crypter, Ransomware Builder, etc...☆16Aug 27, 2021Updated 4 years ago
- Join our telegram channel - t.me/projecthikari☆31Nov 27, 2023Updated 2 years ago
- Trojan Rat Builder(348), Ransomware Builder(17), Crypter(110), Miner(9), Worm(8), Botnet(49), Virus Builder(62), Binder(35), Exploit(42),…☆21Mar 29, 2022Updated 3 years ago
- HTTP/TCP/UDP flooder☆16Apr 18, 2019Updated 6 years ago