A router Sploit is the core of anyone's internet experience, but sadly most people don't spend much time setting up this critical piece of hardware
☆58Mar 30, 2026Updated last month
Alternatives and similar repositories for routersploit
Users that are interested in routersploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- hashcrack is a python script which uses online hash crackers to find cleartext of a hash in less than 3 seconds☆49Mar 30, 2026Updated last month
- There are three ways to create an email bomb Mass mailing☆65Mar 30, 2026Updated last month
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆32Apr 15, 2018Updated 8 years ago
- Ha3Mrx Pentesting and Security Hacking☆438Nov 15, 2024Updated last year
- Facebook Cracker Version 1.0 can crack into Facebook Database 100% without Interruption By Facebook Firewall☆737Mar 30, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- InstaBrute Two Ways to Brute-force Instagram Account Hacking☆1,445Jul 17, 2024Updated last year
- find any page admin and cpanel☆11Jul 29, 2017Updated 8 years ago
- A shell script for easy installation of routersploit tool on termux.☆21Dec 24, 2023Updated 2 years ago
- DDos-Attack Is A Python script online Attack☆1,773Mar 30, 2026Updated last month
- ☆33Feb 27, 2018Updated 8 years ago
- ☆13Sep 24, 2023Updated 2 years ago
- pArAnoIA - Tiny "Secure" Browser☆13Nov 2, 2024Updated last year
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆16Oct 26, 2020Updated 5 years ago
- Probe domains for as much information and site structure as possible.☆14Jul 18, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆13Mar 16, 2025Updated last year
- WEB SQLi Injection DB Dumper DATA Hacking Tool☆13Oct 1, 2019Updated 6 years ago
- Send automatic reports to Instagram 😪☆10Sep 13, 2021Updated 4 years ago
- Tools for attacking various MIFARE RFID cards☆17Jun 21, 2019Updated 6 years ago
- DEFCON 30 Car Hacking Village Presentation☆11Sep 11, 2022Updated 3 years ago
- Trying to be the best tool to search for exploits in the terminal.☆12Jul 3, 2017Updated 8 years ago
- Hack whatsapp web☆10Jul 1, 2018Updated 7 years ago
- Remote persistent keylogger for Windows and Linux..☆12Aug 21, 2022Updated 3 years ago
- (Hacking-Tool), All tools in one!☆13Jul 5, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 13 years ago
- ☆13Jul 13, 2024Updated last year
- Python-based vulnerability detection tool for web applications☆19Jul 31, 2024Updated last year
- [BASH] Wordpress bruteforce☆11Oct 9, 2020Updated 5 years ago
- Script for installing routersploit on termux☆34Nov 18, 2021Updated 4 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- ☆27Apr 12, 2024Updated 2 years ago
- ☆18Sep 7, 2024Updated last year
- Take down your target Telegram channels by this program☆13Nov 16, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Custom firmware for the HackRF+PortaPack H1/H2☆21Dec 14, 2025Updated 5 months ago
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆13May 9, 2020Updated 6 years ago
- ☆15Jul 18, 2023Updated 2 years ago
- FB-PHISH is a phishing tool of FACEBOOK intented only that will work perfectly.☆10Dec 14, 2023Updated 2 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆21Aug 4, 2020Updated 5 years ago
- Libarchive VFS add-on for Kodi☆16Feb 27, 2026Updated 2 months ago
- Continuous NFC field to light LED equipped implants and tags☆23Sep 11, 2024Updated last year