LOoLzeC / vcrtLinks
Virus collection
☆12Updated 7 years ago
Alternatives and similar repositories for vcrt
Users that are interested in vcrt are comparing it to the libraries listed below
Sorting:
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆47Updated 2 years ago
- SHELL SCANNER☆19Updated 6 years ago
- A Advance Phishing OTP Bypass Tool☆15Updated 4 years ago
- Anubis 7.0☆27Updated 9 months ago
- This is a combination of a hacking and a cracking tool.☆33Updated 4 years ago
- Eficaz herramienta capaz de inyectar un backdoor a casi cualquier app Android actual☆38Updated 4 years ago
- A pentesting tool inspired by mr robot and derived by zphisher☆69Updated 2 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆45Updated 6 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆19Updated 3 years ago
- Keylogger for ethical hackers☆15Updated 3 years ago
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆50Updated 4 years ago
- Auxile Framework☆29Updated 4 years ago
- web scanner - exploitation - information gathering☆7Updated 6 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- Herramienta para comprobar nombre de usuario en más de 100 sitios web, foros y redes sociales.☆13Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆56Updated 7 years ago
- Facebook phisher to get password and email of victim.☆26Updated 7 years ago
- 19 Social Media Phishing Pages #phishing #shellphish #phish☆14Updated 4 years ago
- Skeleton is a Social Engineering tool attack switcher☆71Updated 4 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆63Updated 5 years ago
- InstaBrute | Using For Brute Force Instagram Account☆35Updated 8 years ago
- remote administrator framework☆22Updated 11 months ago
- Simple script masks the phishing link under the normal URL☆84Updated 4 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆23Updated 4 years ago
- This is a small framework for generate and listen to Keylogger malwares... And also the most effective and most useful feature about this…☆19Updated 5 years ago
- A python tool for generating strong password☆11Updated 2 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆35Updated 5 years ago
- XSS Cookie Stealer | PROOF OF CONCEPT☆32Updated 2 years ago
- this FUD Payload☆39Updated 3 years ago