Kripto-Sec / Cbackdoor
Malware feito em C com algumas funções "extras" como um keylogger
☆17Updated 4 years ago
Alternatives and similar repositories for Cbackdoor
Users that are interested in Cbackdoor are comparing it to the libraries listed below
Sorting:
- Python Net Tool is a simple networking tool made in python☆5Updated 4 years ago
- Script feito em python que lista cameras ips expostas na internet☆9Updated 4 years ago
- Script Feito usando a API do Hunter.io v2☆3Updated 4 years ago
- Painel de consulta☆40Updated 3 years ago
- Painel de consultas completas de código aberto☆14Updated 3 years ago
- ☆18Updated 3 years ago
- ☆49Updated 6 years ago
- Um painel de consultas simples feito 100% em python.☆10Updated last year
- The linux choice collection tools☆64Updated 6 years ago
- ☆259Updated 4 years ago
- XerXes - Most powerful dos tool bY mR.Thg☆181Updated last year
- painel de consulta☆160Updated 9 months ago
- developing...☆16Updated 2 months ago
- 『🔍』Simple Information finder using Google Dork☆34Updated 4 years ago
- A-Rat ( Remote Administration Tools ) Based Reverse Shell Coded By ./Xi4u7 Use 'help' To Tutorial :)☆229Updated 2 years ago
- An full HTTP server for Phishing. Downloads recursively the entire webpage.☆135Updated 4 years ago
- ☆236Updated 2 years ago
- SocialFish FaKe Pishing social sites☆43Updated 7 years ago
- Advanced Vulnerability Scanner Tool☆70Updated 11 months ago
- Automated Payload Generator Tool☆107Updated 4 years ago
- Script que envia e-mails de denúncia para desativar número de WhatsApp.☆105Updated last year
- Virus - Trojans - Worms - Malwares☆233Updated 7 months ago
- Bot De Instagram Para Ganar Seguidores☆23Updated 4 years ago
- Burn Byte is a modern and powerful DDOS Toolkit☆37Updated 3 years ago
- ☆1Updated 2 years ago
- Phishing Facebook Page in Django Code(Python Based)☆173Updated 3 years ago
- Phishing Tool For Advanced Instagram Copyright Infringement Attack☆82Updated last year
- .☆14Updated last year
- Painel de Consultas☆15Updated 3 years ago
- Undetectable helps you to generate fully undetectable payload of metasploit which can bypass android antivirus.☆109Updated last year