☆29Apr 16, 2020Updated 5 years ago
Alternatives and similar repositories for pwndbTorCredentials
Users that are interested in pwndbTorCredentials are comparing it to the libraries listed below
Sorting:
- PHP Script demonstrating a smart honey pot.☆18Apr 19, 2014Updated 11 years ago
- Python backdoor that uses http post/get requests to communicate☆42Aug 24, 2016Updated 9 years ago
- This is a basic Python script that accepts a website's url in string format to initiate a DDoS attack. For educational purposes only.☆14Jan 3, 2015Updated 11 years ago
- Helping my friend with her economics research project by scraping drug information from DarkWeb using selenium and Tor☆18Mar 12, 2020Updated 5 years ago
- Quick binary search for NTLM hash dataset☆18Jan 31, 2019Updated 7 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- A python server tool based on flask , this tool can phish some Facebook credentials!☆17Jun 22, 2019Updated 6 years ago
- Parses and forwards rsyslog process stats to a local statsite, statsd, or wire protocol compatible service.☆20Nov 19, 2025Updated 3 months ago
- Poc script for ProxyShell exploit chain in Exchange Server☆24Feb 24, 2022Updated 4 years ago
- An OSINT tool to search for accounts by username in social networks.☆19Aug 8, 2022Updated 3 years ago
- Python implementation of the SlowLoris DoS attack.☆24Mar 19, 2017Updated 8 years ago
- Open-source Exploiting Framework☆31Mar 13, 2017Updated 8 years ago
- Learning-Pentesting-With-Python☆18Sep 26, 2018Updated 7 years ago
- Get clients and access points.☆48Aug 28, 2019Updated 6 years ago
- Script Spam Call☆22Sep 23, 2020Updated 5 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Jul 10, 2017Updated 8 years ago
- Crackhash is a tool that try to crack different types of hashes using free online services.☆25Oct 29, 2019Updated 6 years ago
- ☆25Mar 21, 2020Updated 5 years ago
- A simple python scanner to detect vulnerable hosts in your net☆21May 15, 2017Updated 8 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Identify connection of sessions for social engineering attacks.☆58Nov 15, 2016Updated 9 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- ☆12May 13, 2020Updated 5 years ago
- SQLi Google Dork Scanner☆59Dec 7, 2021Updated 4 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Apr 26, 2025Updated 10 months ago
- A nefarious keylogger for Ubuntu. Encrypts keylogs and uploads to pastebin.☆27May 1, 2017Updated 8 years ago
- Facebook Phishing Undetected Desktop & Mobile Version (Greek_Locale)☆53Jul 25, 2020Updated 5 years ago
- Account checker for Spotify music service.☆27Oct 10, 2021Updated 4 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Crack ios Restriction PassCode in Python☆38Sep 30, 2020Updated 5 years ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vuln…☆33Aug 1, 2021Updated 4 years ago
- ⛷ A collection of hacker scripts.☆28Jan 24, 2017Updated 9 years ago
- IoT device scanner.☆41Aug 19, 2019Updated 6 years ago
- Gathers public information on companies to highlight social engineering risk.☆30May 25, 2016Updated 9 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆124Dec 21, 2023Updated 2 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- Zombie Bot from Darkweb☆34May 22, 2023Updated 2 years ago
- WhatsSpy Public - Spy Tool Whatsapp☆10Aug 23, 2015Updated 10 years ago