Password Attack Toolkit
☆16Nov 1, 2018Updated 7 years ago
Alternatives and similar repositories for Katak
Users that are interested in Katak are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Deepfakes Software For All☆10Feb 21, 2020Updated 6 years ago
- Clone a voice in 5 seconds to generate arbitrary speech in real-time☆18Jan 27, 2020Updated 6 years ago
- Really quickly build APKs on handheld device (smartphone or tablet) in Amazon, Android, Chromebook and Windows📲 See https://buildapks.g…☆12Dec 24, 2019Updated 6 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆16Aug 6, 2020Updated 5 years ago
- Virus Collection☆21Oct 4, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆59Jan 19, 2022Updated 4 years ago
- Fake Deface☆16Sep 3, 2018Updated 7 years ago
- credit card generator☆37Mar 4, 2020Updated 6 years ago
- Accurately Locate Smartphones using Social Engineering☆13Jun 3, 2020Updated 5 years ago
- thelinuxchoice/blackeye☆12Jul 26, 2020Updated 5 years ago
- Admin Panel Finder☆16Jan 25, 2022Updated 4 years ago
- Sms spoof☆10Feb 19, 2026Updated last month
- Get unlimited followers on Instagram for free . Bot by CyberGhost☆15Sep 28, 2020Updated 5 years ago
- Install Any Linux From The Options On Termux Very Easily...☆10Jun 6, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Admin Panel Finder☆15Nov 1, 2019Updated 6 years ago
- Auxile Framework☆28Oct 1, 2020Updated 5 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆14Jul 31, 2019Updated 6 years ago
- Simple tool which checks username/email password combinations.☆18May 23, 2021Updated 4 years ago
- InfoG ~ Information Gathering Tools☆22Aug 1, 2018Updated 7 years ago
- OSINT scanning tool which discovers and maps directories found in javascript files hosted on a website.☆14Feb 23, 2019Updated 7 years ago
- Automatically Scans For Default Networks & Guess The Password☆14Dec 9, 2016Updated 9 years ago
- My Apps☆15May 11, 2022Updated 3 years ago
- ☆13Sep 30, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Black Webbrowser v2.0☆17Sep 22, 2023Updated 2 years ago
- Facebook Hacking Tools☆34Jul 8, 2019Updated 6 years ago
- Social Engineering Tool☆302Oct 16, 2020Updated 5 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Oct 13, 2020Updated 5 years ago
- automatically crack WPA handshakes and [MD5, NTLM, MYSQL, SHA256 ....] hashes. with GPU and CPU powers.☆49May 18, 2016Updated 9 years ago
- you can use this tool for locate any phone number☆22Jul 14, 2020Updated 5 years ago
- A simple chess made specially for termux☆12Dec 15, 2020Updated 5 years ago
- a powerful bot which increase your Instagram followers☆14Apr 23, 2023Updated 2 years ago
- Admin finder is a tool that serves to find the login page of a website.☆13Oct 16, 2025Updated 5 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆378Jul 23, 2020Updated 5 years ago
- Tool social engineering [Access Webcam & Microphone & Os Password Grabber & Location Finder] With Ngrok☆20Oct 28, 2021Updated 4 years ago
- Dark-Fb No Login 100% safe☆26Aug 16, 2021Updated 4 years ago
- A lot of accounts can be hacked with bruteforce method this is a simple app which demonstrates it on instagram.☆28Nov 4, 2020Updated 5 years ago
- Launch different bash configurations for Linux vs OSX, interactive vs batch☆40Aug 11, 2012Updated 13 years ago
- eda-3 from many years ago☆14Sep 5, 2014Updated 11 years ago
- A web application hacker's toolbox. Base64 encoding/decoding, URL encoding/decoding, MD5/SHA1/SHA256/HMAC hashing, code deobfuscation, fo…☆53Aug 13, 2024Updated last year