A router Sploit is the core of anyone's internet experience, but sadly most people don't spend much time setting up this critical piece of hardware
☆57Feb 18, 2022Updated 4 years ago
Alternatives and similar repositories for routersploit
Users that are interested in routersploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Binaries Payloads Web Payloads Scripting Payloads Shellcode☆38Sep 6, 2018Updated 7 years ago
- hashcrack is a python script which uses online hash crackers to find cleartext of a hash in less than 3 seconds☆48Apr 15, 2018Updated 7 years ago
- There are three ways to create an email bomb Mass mailing☆64Feb 18, 2022Updated 4 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆31Apr 15, 2018Updated 7 years ago
- Ha3Mrx Pentesting and Security Hacking☆438Nov 15, 2024Updated last year
- Git Best Tools Hacking For Kali Linux 2018☆257May 14, 2018Updated 7 years ago
- Facebook Cracker Version 1.0 can crack into Facebook Database 100% without Interruption By Facebook Firewall☆716Jun 21, 2024Updated last year
- ☆14Sep 20, 2014Updated 11 years ago
- Infect Android Phone☆10Jun 21, 2023Updated 2 years ago
- A shell script for easy installation of routersploit tool on termux.☆20Dec 24, 2023Updated 2 years ago
- ☆32Feb 27, 2018Updated 8 years ago
- ☆13Sep 24, 2023Updated 2 years ago
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆16Oct 26, 2020Updated 5 years ago
- WEB SQLi Injection DB Dumper DATA Hacking Tool☆12Oct 1, 2019Updated 6 years ago
- Probe domains for as much information and site structure as possible.☆14Jul 18, 2024Updated last year
- ☆13Mar 16, 2025Updated last year
- DEFCON 30 Car Hacking Village Presentation☆11Sep 11, 2022Updated 3 years ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- Trying to be the best tool to search for exploits in the terminal.☆12Jul 3, 2017Updated 8 years ago
- Remote persistent keylogger for Windows and Linux..☆12Aug 21, 2022Updated 3 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 13 years ago
- ☆13Jul 13, 2024Updated last year
- ☆23Apr 12, 2024Updated last year
- python script for Hack gmail account brute force☆1,161Jan 17, 2024Updated 2 years ago
- Python-based vulnerability detection tool for web applications☆18Jul 31, 2024Updated last year
- ☆18Sep 7, 2024Updated last year
- Take down your target Telegram channels by this program☆13Nov 16, 2025Updated 4 months ago
- Custom firmware for the HackRF+PortaPack H1/H2☆19Dec 14, 2025Updated 3 months ago
- ☆15Jul 18, 2023Updated 2 years ago
- FB-PHISH is a phishing tool of FACEBOOK intented only that will work perfectly.☆10Dec 14, 2023Updated 2 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Aug 4, 2020Updated 5 years ago
- Continuous NFC field to light LED equipped implants and tags☆22Sep 11, 2024Updated last year
- Libarchive VFS add-on for Kodi☆15Feb 27, 2026Updated 3 weeks ago
- 🕷 aircrack-ng - wifi network security collection dockerized☆14Dec 1, 2016Updated 9 years ago
- A Metasploit payload that will connect to the victim and open up a permanent backdoor to their phone.☆57Sep 4, 2016Updated 9 years ago
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- Flipper Zero fap for writing several keys to one T5577☆21Jan 15, 2024Updated 2 years ago
- Facebook Group Admin Takeover☆27Oct 3, 2024Updated last year
- Evil Portal infusion for the wifi pineapple☆17May 13, 2018Updated 7 years ago