to grab or steal the password of systemAutomated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords Download git clone https://github.com/pourquoibenoit/WinPirate.git This project is still in progress Estimated Completion Date: soon…ish Here’s the plan. We create a way to automate doing the sticky k…
☆57Jan 31, 2018Updated 8 years ago
Alternatives and similar repositories for winpirate
Users that are interested in winpirate are comparing it to the libraries listed below
Sorting:
- Open-source Exploiting Framework☆31Mar 13, 2017Updated 8 years ago
- From my YouTube Tutorial "How to create a flooder with python adn twilio☆10Mar 1, 2018Updated 8 years ago
- Scripts and methods of modifying ARM Linux distributions made available by Debian Kit for rooted Android devices will be uploaded here fo…☆13Mar 17, 2015Updated 10 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- wordpress xmlrpc + wp-login.php brute force☆10Mar 13, 2021Updated 4 years ago
- OSINT tool for Instagram☆15Feb 19, 2019Updated 7 years ago
- Get files from Android directories☆11Dec 9, 2018Updated 7 years ago
- Communicate with government surveillance programs via your metadata.☆26Oct 9, 2018Updated 7 years ago
- SAS_Registry_Hack (Super Administrator Suppressor) is a Simple Reg. File which totally disables every user control (UAC) and a little mor…☆18Oct 22, 2020Updated 5 years ago
- Easier to make images to sell your cool csgo skins☆11Sep 19, 2015Updated 10 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Jan 15, 2015Updated 11 years ago
- An SMS gateway that allows you to check your bitcoin wallet. A weekend hack.☆13Mar 16, 2014Updated 11 years ago
- malware for ATM☆15Oct 25, 2017Updated 8 years ago
- 🀄️ WebShell Backdoor Framework☆16Jun 7, 2018Updated 7 years ago
- PoC Android smart phone botnet☆79Aug 4, 2012Updated 13 years ago
- Jakub's security research☆12Feb 3, 2026Updated last month
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 9 years ago
- creating textnow account with temp email☆16Apr 2, 2019Updated 6 years ago
- #!/usr/bin/python2 #coding=utf-8 #The Credit For This Code Goes To lovehacker #If You Wanna Take Credits For This Code, Please Look Yours…☆29Oct 24, 2021Updated 4 years ago
- HACK CCTV CAMERA ANYWHERE IN THE WOLD USING THIS TOOL #IT IS MY OWN THIS TOOLA IT IS AMAZING BRO #Wait... #FOR INSTALL THIS TOOL TY…☆20Feb 4, 2021Updated 5 years ago
- System hack to disable and toggle WebRTC in macOS Safari☆18May 1, 2018Updated 7 years ago
- Spam call (panggilan) untuk mengerjai teman☆22Jul 18, 2022Updated 3 years ago
- An tool for search IOT MQTT vulnerable with shodan☆20Sep 15, 2017Updated 8 years ago
- KINS Banking Trojan☆65Feb 25, 2015Updated 11 years ago
- Cisco Adaptive Security Appliance and FTD Unauthorized Remote File Reading☆17Jul 28, 2020Updated 5 years ago
- This Project will let you install termux black . metasploit , various tools and Kali Nethunter Rootless without any error in your Termux.☆20Jul 29, 2020Updated 5 years ago
- DIY bad USB [shellcode injector] using arduino [AVR family microcontrollers] to exploit windows targets.☆16Aug 17, 2015Updated 10 years ago
- 🦎Mifare DESFire emulation support for the ChameleonMini (RevG) firmware. ☮✌️🇺🇦🇺🇸☆21Mar 15, 2022Updated 3 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Aug 2, 2016Updated 9 years ago
- ☆20Aug 31, 2019Updated 6 years ago
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- simple, basic keylogger using VB.NET☆20Aug 28, 2013Updated 12 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- ☆12May 13, 2020Updated 5 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆52Feb 28, 2017Updated 9 years ago
- Security test tool for Blind XSS☆26Mar 5, 2020Updated 6 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26May 1, 2017Updated 8 years ago
- ⭕️💰 Network monitoring solution to detect crypto-mining on local machines.☆31Jun 27, 2018Updated 7 years ago