Finder V-Pro
☆13Mar 14, 2025Updated last year
Alternatives and similar repositories for FVP
Users that are interested in FVP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Execute remote commands from your discord bot☆16Jun 9, 2020Updated 5 years ago
- Tous les trucs utilisés dans les Tutos, les shellcodes, les templates, les notes...☆14Jan 15, 2024Updated 2 years ago
- WiFi Cha0s t00lkit w/ multi payload options☆84Updated this week
- Windows Crypter/Decrypter Generator with AES 256 bits key - Fully Undetectable (FUD)☆18May 18, 2020Updated 5 years ago
- A more complex version of GreenTea, with basic cheat features and a rather clean code base with comments for clarity.☆17Nov 4, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Auto apply for a job with the indeed bot☆35Jul 27, 2025Updated 9 months ago
- Python SSH Botnet DDOS☆24Apr 13, 2021Updated 5 years ago
- BioIG is a module that allows you to extract personnals informations from an instagram profile bio such as : Religion, Hobbies, Ethnicity…☆29Mar 21, 2021Updated 5 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- WordPress Bruteforce List, Default paths and endpoints☆75May 14, 2022Updated 3 years ago
- This application was created as a POC for how to scan your local network traffic for HTTP requests and then inject various javascript cry…☆84Aug 23, 2020Updated 5 years ago
- An easy to handle hacking script, SSH Forcebrute, FTP Forcebrute and many others features☆63Feb 18, 2022Updated 4 years ago
- 👾- An open-source post-exploitation framework, researchers and developers.☆55Jul 29, 2023Updated 2 years ago
- Cronos Crypter is an simple example of crypter created for educational purposes.☆105Sep 19, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆136Sep 25, 2019Updated 6 years ago
- A python script designed to check if the website if vulnerable of clickjacking and create a poc☆157Sep 5, 2020Updated 5 years ago
- Investigate Snapchat users with SnapIntel OSINT tool☆278Mar 24, 2026Updated last month
- A list of tools that handle different data and make it usable in Maltego.☆268Nov 9, 2024Updated last year
- A Complete Osint Tool☆3,323Feb 21, 2026Updated 2 months ago
- a simple hidden silent XMR miner.☆188Jan 26, 2019Updated 7 years ago
- Obtain a Phone Number full profile including HLR, Reputation, Carrier, Social Media Accounts, Geolocation, Validation, Availabilty, Porta…☆279Nov 25, 2023Updated 2 years ago
- A list of tools to search accounts by username☆633Apr 13, 2026Updated 2 weeks ago
- Osint tool based on namechk.com for checking usernames on more than 100 websites, forums and social networks.☆614Mar 23, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Security tool to find potential vulnerable Server Side Request Forgery (SSRF) parameters.☆361Feb 13, 2026Updated 2 months ago
- This Python script can be used to bypass IP source restrictions using HTTP headers.☆402Sep 16, 2025Updated 7 months ago
- Faster xss scanner,support reflected-xss and dom-xss☆443Sep 25, 2023Updated 2 years ago
- 💥 advanced sms bomber in python to kill the phone☆380Feb 19, 2024Updated 2 years ago
- fully automated pentesting tool☆517Dec 8, 2022Updated 3 years ago
- Tools OSINT MOBILE☆669Dec 5, 2024Updated last year
- Open source platform for cyber security analysts with many features for threat intelligence and detection engineering.☆853Updated this week
- Python network worm that spreads on the local network and gives the attacker control of these machines.☆531Oct 5, 2022Updated 3 years ago
- Remote Access Tool☆619May 1, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Best Bombing Tool with WhatsApp, Instagram, SMS bomber☆645May 23, 2024Updated last year
- Crypter, binder & downloader with native & .NET stub, evasive by design, user friendly UI☆735Jun 28, 2025Updated 10 months ago
- 🔍 An OSINT tool for discovering linked social accounts and associated emails across multiple platforms using a single username.☆938Feb 28, 2026Updated 2 months ago
- Compile-time, Usermode + Kernelmode, safe and lightweight string crypter library for C++11+☆830Jun 3, 2021Updated 4 years ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆939May 28, 2025Updated 11 months ago
- This cheatsheet is aimed at the OSCP aspirants to help them understand the various methods of Escalating Privilege on Linux based Machine…☆882Mar 14, 2026Updated last month
- Mobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting☆1,050Mar 1, 2026Updated 2 months ago