Files for maxphisher
☆21Dec 30, 2023Updated 2 years ago
Alternatives and similar repositories for maxfiles
Users that are interested in maxfiles are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A phishing tool for over +30 sites☆96May 7, 2024Updated last year
- Advanced pishing tool with 30+ templates☆16May 1, 2022Updated 3 years ago
- ☆14Jun 1, 2020Updated 5 years ago
- ☆23Nov 22, 2024Updated last year
- NetScope is a network scanning and monitoring Ethical Hacking tool designed to help users discover and monitor devices in their network.I…☆20Oct 31, 2025Updated 4 months ago
- A powerful tool to scan CRLF vulnerability written in Python☆15Oct 31, 2023Updated 2 years ago
- These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation☆18Oct 3, 2021Updated 4 years ago
- Website Phishing Source Code☆34Jun 27, 2022Updated 3 years ago
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- Simple netcat implementation for Android☆28Dec 12, 2017Updated 8 years ago
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago
- SWB - it is new generation command tool to bruteforce WiFi networks via android device. ROOT Required!☆26Sep 26, 2023Updated 2 years ago
- A repository that contains files needed for a standalone magisk module with loadable kernel modules☆26Dec 28, 2024Updated last year
- An OSINT tool to easily generate Facebook url's to access publicly available information from Facebook profiles☆12Feb 22, 2017Updated 9 years ago
- Bypass Reset Password Code Lead to Account Takeover☆26Sep 16, 2024Updated last year
- Bluetooth spoofing to grab the connection between two paired bluetooth devices.☆13Aug 3, 2020Updated 5 years ago
- A script to test for subdomain takeovers from a list of domains☆12Feb 18, 2023Updated 3 years ago
- Funny Fuzzing Wordlist☆14Jun 14, 2022Updated 3 years ago
- A simple bash script to install most used penetration testing and hacking tools on Manjaro Linux.☆12Jun 11, 2020Updated 5 years ago
- ☆22Apr 1, 2024Updated last year
- Remake of OSIF by CiKu370☆15Dec 17, 2020Updated 5 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Jul 29, 2016Updated 9 years ago
- A tool for finding CNAME of subdomains and checking clickjacking vulnerability.☆13Jun 15, 2025Updated 9 months ago
- an Android app showing a map of cell towers you passed by the day☆16Mar 14, 2011Updated 15 years ago
- Uses the Google Places API to get the name, email-address and website of businesses☆10Sep 14, 2019Updated 6 years ago
- A python script to extract contact names and email addresses from all messages on an IMAP server.☆15Nov 12, 2015Updated 10 years ago
- Kumpulan Script Hacking Untuk Termux Dan Kali Linux☆49Jun 19, 2022Updated 3 years ago
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆12Aug 1, 2021Updated 4 years ago
- Tellonym scraper and information gathering tool. Might be useful for getting background-info on a person, etc. 🔍☆12Dec 8, 2022Updated 3 years ago
- Open source alternative to Burpsuite☆16May 18, 2021Updated 4 years ago
- A tool which can perform advance recon automatically. Sit back and enjoy this tool work for you and find target's subdomains automaticall…☆11Sep 17, 2021Updated 4 years ago
- ☆10Jan 3, 2022Updated 4 years ago
- Credential phishing using Android Hotspot Captive Portals☆28Aug 14, 2024Updated last year
- A domain recon tool to help detect DNS based vulnerabilities, such as zone transfers and subdomain takeovers.☆11Mar 25, 2022Updated 4 years ago
- Generate Random Reset Instagram URLs and check if they still valid for a complete account takeover☆12Apr 26, 2022Updated 3 years ago
- INTERNATIONAL 30 COUNTRY CRACKER 6,7,AND CRACKING FROM OWN PASSWORD HAS BEEN ADDED ENJOY GUYS🥰☆11Feb 1, 2022Updated 4 years ago
- Quickly Access and Infiltrate ADB Devices With Shodan API☆11Jul 27, 2025Updated 7 months ago
- This is the android client/trojan, it's undetectable, can turn the target phone to a HTTP proxy and runs in the background permanently wi…☆13Jan 10, 2021Updated 5 years ago