MrMugiwara / elpscrkLinks
Elliot Password's Cracker
☆51Updated 9 years ago
Alternatives and similar repositories for elpscrk
Users that are interested in elpscrk are comparing it to the libraries listed below
Sorting:
- Python script that will extract all saved passwords from your google chrome database on windows only☆81Updated 5 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆54Updated 4 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆39Updated 7 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆27Updated 8 years ago
- A python tool that will extract exif data from picture with two methods☆38Updated 4 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆110Updated 7 years ago
- bluesnarfing proof-of-concept tool.☆56Updated 9 years ago
- Programmed For Penetration Testing Beginners . This Program Based on Mdk3 . "WiFi Stress Testing Beacon Flooding & Deauthentication Attac…☆90Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆58Updated 8 years ago
- python remote access trojan☆38Updated 8 years ago
- Gloom-Framework :: Linux Penetration Testing Framework☆52Updated 8 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆74Updated 6 years ago
- WiFi-Jammer/DoS toolset☆61Updated 5 years ago
- Kill Any Antivirus Using Python For Windows Users .☆47Updated 9 years ago
- steal cookies from firefox cookies database(cookies.sqlite)☆55Updated 10 years ago
- Mr. Robot's EvilCorp Terminal style for your shell☆41Updated 9 years ago
- An Android spyware which interacts with a remote C&C server to exfiltrate phone data☆76Updated 5 years ago
- InstaBrute | Using For Brute Force Instagram Account☆36Updated 8 years ago
- Package manager for hackers built by hackers☆36Updated 7 years ago
- Fast exploitation based on metasploit.☆74Updated 6 years ago
- Simple but sharp ransomware☆35Updated 5 years ago
- Ransombile is a tool that can be used in different scenarios to compromise someone’s digital life when having physical access to a locked…☆83Updated 3 years ago
- the best and small passwords lists to crack handshake wpa-wpa2☆78Updated 4 years ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆34Updated 8 years ago
- A simple phishing tool that can phish almost any website☆76Updated 7 years ago
- SMS Phishing Tools☆79Updated 8 years ago
- Using Social Engineering To Obtain WiFi Passwords☆101Updated 7 years ago
- HTTP botnet☆62Updated 9 years ago
- Record X11 keypress events to a log file☆27Updated 7 years ago
- Quasar : An Information Gathering Framework For Lazy Penetration Testers☆162Updated 4 years ago