Jfaler / soupLinks
☎️ Original open source call flooder using Twilio's API.
☆343Updated 3 years ago
Alternatives and similar repositories for soup
Users that are interested in soup are comparing it to the libraries listed below
Sorting:
- Python 2.7 is obsolete, please use https://github.com/xp4xbox/Python-Keylogger☆50Updated 5 years ago
- Open source call/text flooder using Twilio API.☆66Updated 4 years ago
- An automated Wireless RogueAP MITM attack framework.☆187Updated 6 years ago
- Borrow CPU cycles from visitor's web browsers to crack MD5 password hashes 😲☆186Updated 4 years ago
- An automated script for deauthentication attack☆267Updated 5 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆357Updated 8 months ago
- A malicious captive wifi portal☆143Updated 5 years ago
- The official Wiki for the Bash Bunny☆206Updated 4 years ago
- Cloak can backdoor any python script with some tricks.☆496Updated 6 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Updated 2 years ago
- Your Social Engineering Sidekick☆183Updated 2 years ago
- Asynchronous Python implementation of SlowLoris DoS attack☆100Updated last month
- A python module for dumping usable proxies.☆159Updated 5 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆255Updated 7 years ago
- Improved DOS exploit for wordpress websites (CVE-2018-6389)☆121Updated 4 years ago
- A list of private and public (more or less) blackhat boards☆267Updated 6 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆162Updated 2 years ago
- Hacking systems with the automation of PasteJacking attacks.☆398Updated 8 months ago
- Snoopy v2.0 - modular digital terrestrial tracking framework☆438Updated 8 years ago
- Encoding Tools for Rubber Ducky☆435Updated last year
- Selenium powered Python script to automate searching for vulnerable web apps.☆346Updated 3 years ago
- Custom Fake Portal To Harvest Users Social Media Accounts☆57Updated 3 years ago
- 🔓Crack hashes using online rainbow & lookup table attack services, right from your terminal.☆233Updated 2 years ago
- network reconnaissance toolkit☆423Updated 6 years ago
- Sets Transparent proxy tunnel through Tor, I2P, Privoxy, Polipo and modify DNS; Include Anonymizing Relay Monitor (arm), macchanger and w…☆314Updated 2 years ago
- 🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN …☆544Updated 5 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆600Updated 4 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆331Updated 10 months ago
- OSINT python webscaping framework☆1,095Updated 2 years ago
- A simple, fully python ransomware PoC☆376Updated 5 years ago