Hax4us / xerosploit
Efficient and advanced man in the middle framework
☆23Updated 4 years ago
Alternatives and similar repositories for xerosploit:
Users that are interested in xerosploit are comparing it to the libraries listed below
- Find GeoLocation with High Accuracy...☆29Updated 5 years ago
- Androtoolkit can use in termux to create payload , install metasploit & ngrok also :)☆72Updated 7 years ago
- Termux packages that are only usable by root users.☆24Updated 4 years ago
- Give a Mask to Phishing URL like a PRO☆32Updated 4 years ago
- ☆16Updated 7 years ago
- ☆19Updated 4 years ago
- A build system and primary set of packages for Termux.☆16Updated 3 years ago
- A place for new or unstable packages.☆11Updated 4 years ago
- This is the official repo for the Jumbo version of John the Ripper. The "bleeding-jumbo" branch (default) is based on 1.8.0-Jumbo-1 (but …☆32Updated 7 years ago
- A script to install the metasploit-framework automatically or without hassle and errors.☆41Updated 7 years ago
- ✨ Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com☆14Updated 3 years ago
- Packages using the X Window System.☆12Updated 6 years ago
- decompiled pegasus_spyware☆40Updated 3 years ago
- An chroot-like implementation using ptrace.☆17Updated 5 years ago
- A tool for reverse engineering Android apk files☆16Updated 5 years ago
- Hacking Links On Termux☆35Updated 6 years ago
- ☆33Updated 5 years ago
- Kali Linux Distro For Termux☆53Updated 4 months ago
- Termux Nethunter GUI Installer☆47Updated 5 months ago
- Use setupTermuxArch.sh 📲 to install Arch Linux in Termux on Android, Chromebook and Fire OS. This setup script will attempt to set Arch …☆20Updated 7 years ago
- ☆30Updated 7 years ago
- Cookies Stealer Script For Termux !!!☆32Updated 4 years ago
- ☆16Updated 6 years ago
- ☆30Updated 3 years ago
- Localhost Server With Termux☆38Updated 2 years ago
- Red Widow Spider Tools☆31Updated 3 years ago
- Ubuntu chroot on termux☆20Updated 7 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆15Updated 4 years ago
- ☆14Updated last year
- Accurately Locate Smartphones using Social Engineering☆12Updated 4 years ago