Ha3MrX / HashCrack
hashcrack is a python script which uses online hash crackers to find cleartext of a hash in less than 3 seconds
☆47Updated 6 years ago
Alternatives and similar repositories for HashCrack:
Users that are interested in HashCrack are comparing it to the libraries listed below
- There are three ways to create an email bomb Mass mailing☆64Updated 3 years ago
- Binaries Payloads Web Payloads Scripting Payloads Shellcode☆38Updated 6 years ago
- A router Sploit is the core of anyone's internet experience, but sadly most people don't spend much time setting up this critical piece o…☆56Updated 3 years ago
- The EVIL EMAIL/SMS BOMBER is made for research and testing purposes only. Prank your friends. EVIL EMAIL/SMS BOMBER can send bulk mail …☆45Updated 3 years ago
- New > https://github.com/AngelSecurityTeam/RevoltShing☆84Updated 3 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆45Updated 5 years ago
- Wordlist générator, router flood and Wifi Cracker☆49Updated 4 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆29Updated 6 years ago
- Includes Spoof kit, Phishing Tool Kit, Credit Card Scanner, IP Sniffer, KeyLoggers, Tabnabbing, RansomWare, Viruses, RATS And More . . .☆45Updated 6 years ago
- Finder Web Site Admin Login Page☆60Updated 3 years ago
- SMS/Email/whatsapp Bombers Collection.☆33Updated 4 years ago
- Mesagge Encryption☆30Updated 3 years ago
- #Just simple program to spoofing device by sending malicious link☆29Updated 3 years ago
- Wi-Fi Password Stealer☆53Updated 5 months ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆51Updated 7 years ago
- The Most Powerful Fake Page Redirecting tool...☆53Updated 2 years ago
- Meterpreter payload for all platforms☆66Updated 3 years ago
- IP and geolocation tracking tool☆51Updated 5 months ago
- Make custom phishing page with Black-Water you just need to put required in create folder.☆34Updated 4 years ago
- Best Google Dorker Available☆33Updated 5 months ago
- This is a Brute forcer Dictionary attacker. From the following, there is a dictionary file denoted by '-d' which contains all multiple p…☆59Updated 4 years ago
- This tool will create a .exe file which will send you all the information of victim once the file executes!☆35Updated 4 months ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆61Updated 4 years ago
- Skeleton is a Social Engineering tool attack switcher☆66Updated 4 years ago
- This tool will allows u to deauth or kick off an specific device from an given AP☆23Updated 2 years ago
- Virus Repository☆44Updated 5 months ago
- Phishing Tool For Advanced Instagram Copyright Infringement Attack☆81Updated last year
- Crypton: linux Pentester tools, penetration testing and ethical hacking☆65Updated 6 years ago
- bring shell grabber a python bot which grab shells easily just by entering site list and it search for vulnerabilities as well as exploit…☆42Updated 3 years ago
- A Complete Phishing Tool☆35Updated 4 years ago