Faster3ck / RandomWordlistGenerator
Generate random wordlist to test your passwords' security
☆12Updated 2 years ago
Related projects: ⓘ
- Google dorks generator to find open shells (on government sites)☆29Updated 10 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆31Updated 9 years ago
- Much like John the Ripper, without all the fancy shit. Just reads from a wordlist and cracks them hashes.☆14Updated 4 years ago
- Man-in-the-middle against Tor bridges☆23Updated 4 years ago
- Search without being tracked-(Your Own Private Search Engine )☆17Updated 3 years ago
- Attacking WPA/WPA encrypted access point without client.☆46Updated 10 years ago
- I created my own Keylogger I am going to open source its code .But no one is allowed to use it commercially and I have actual copy right…☆12Updated 6 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆17Updated 9 years ago
- A HTTP bot in Java with basic commands and ability's☆10Updated 9 years ago
- ☆13Updated this week
- All xxx-arsenal repos in one☆14Updated 5 years ago
- Simple security surveillance script for linux distributions.☆56Updated 7 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 2 years ago
- ☆29Updated this week
- An unfinished project. HTTP botnet coded in VB.net and PHP.☆13Updated 9 years ago
- GoldenEye Mobile Android Layer 7 HTTP DoS Test Tool☆33Updated 11 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆21Updated 9 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆12Updated 8 years ago
- ☆13Updated this week
- A python3 script that uses cl1p website to send and receive secret messages☆27Updated 3 years ago
- ☆12Updated this week
- Simple backdoor for public places, that uses a file system for communication. Just for fun! 😈☆52Updated 4 years ago
- ☆13Updated this week
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆38Updated 8 years ago
- A simple site cloner☆23Updated 7 years ago
- ☆23Updated this week
- Windows/Linux - ReverseShellBackdoor Framework☆47Updated 5 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Updated 9 years ago
- Social Engineering template for credential harvesting. (Facebook as an example).☆40Updated 6 years ago
- Distributed WPA/WPA2 cracker☆14Updated 9 years ago