MichaelDim02 / CyberSpy
CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.
☆9Updated 5 years ago
Alternatives and similar repositories for CyberSpy:
Users that are interested in CyberSpy are comparing it to the libraries listed below
- Android-PIN-Bruteforce☆17Updated 3 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- An advance keylogger that works and also logs special keys.☆19Updated 2 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆29Updated 6 years ago
- Fake WiFi Access Point with captive portal☆12Updated 5 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆52Updated 7 years ago
- simple script to pwn android phone with physical access☆24Updated 6 years ago
- Find usernames☆25Updated 4 years ago
- Automatically Scans For Default Networks & Guess The Password☆14Updated 8 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆16Updated 3 years ago
- Captive Portal Attack Tool☆8Updated 4 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆17Updated 2 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆30Updated 7 years ago
- facebook bot ,like comment,download phone number, download email adress, delect all friends ...........etc☆20Updated 5 years ago
- Information Gathering & WebSite ReConnaissance.☆21Updated 7 years ago
- A simple vuln web scanner☆38Updated 6 years ago
- Sniffnet is a toolkit what is going to help you hacking in the global web. Tools: sqlmap, nikto, nmap, shodan, ping, adminpagefinder, ng…☆26Updated 6 years ago
- a phishing page☆14Updated 7 years ago
- ☆15Updated 3 years ago
- ☆10Updated 4 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆15Updated 3 years ago
- Automating the SQL Injection through Google dorks.☆24Updated 2 years ago
- A Simple Keylogger☆18Updated 6 years ago
- Modified version of userrecon. Mod☆20Updated 4 years ago
- Webdav Mass Exploiter With Python Programming Language☆13Updated 6 years ago
- Leakix Searcher☆14Updated 3 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆44Updated 2 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆13Updated last year
- USE THIS TOOL AGAINST SPAMMERS, THIS TOOL IS SO POWERFULL. ITS MAIN ABILITY IS CALL FLOODING.☆22Updated 4 years ago