WormGPT kawaii ver
☆752Nov 28, 2025Updated 4 months ago
Alternatives and similar repositories for KawaiiGPT
Users that are interested in KawaiiGPT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C2 DDOS, With Method SYN, ICMP, TCP, HTTP, UDP, DNS FLOOD, Slowloris, TLS.☆31Jan 2, 2024Updated 2 years ago
- Open-source CLI for unrestricted AI - Access powerful models without censorship☆946Feb 28, 2026Updated last month
- Worm-AI — blackAI☆270Nov 13, 2025Updated 5 months ago
- CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction dir…☆17Jul 10, 2025Updated 9 months ago
- Here you find the complete list of enrichments and extractionsfor Ubikron.☆37Mar 6, 2026Updated last month
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- -= Has features =- =============== -DDoS -Web Scanning -Phone Hunter -CCTV Hunter -Deface -Mass Deface -Deface Maker -Bypass Maker -Auto…☆272Oct 29, 2025Updated 5 months ago
- [New Update](Added Agentic-Mode, Dark-GODMode)The Real BlackHat GPT - ai can do your illegal stuffs without saying anything. Use At Your …☆86Mar 29, 2026Updated 3 weeks ago
- The WormGPT tool is a tool for doing anything unethical, giving you any hacking code you want or anything.☆288Apr 5, 2024Updated 2 years ago
- Phishing tool script which generate phishing websites with a link to send to victim, the link genrated comes together with a QR code.Medu…☆162Feb 14, 2026Updated 2 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- ☆40Dec 27, 2025Updated 3 months ago
- Tool to Disable User Lock☆26Nov 22, 2022Updated 3 years ago
- List of Mine Private wordlist i use for fuzzing☆91Feb 25, 2026Updated last month
- Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)☆32Mar 27, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A collection of 350+ hacking tools you can install into termux for hacking, Pentesting, Mapping and more. In this tool you will get a tot…☆82Apr 17, 2024Updated 2 years ago
- OSINT sul Social Media, Phone, Cryptovalute, Domini☆24Updated this week
- Gather a lot of information about your targets☆37Jul 18, 2023Updated 2 years ago
- Filter bypass for php shell upload using exiftool and injecting code into an existing image☆13Jan 28, 2021Updated 5 years ago
- Simple Tool to inject JavaScript Code into a GIF File☆14Sep 7, 2019Updated 6 years ago
- Ravage Framework - Powershell weaponized for offensive security professionals.☆78Feb 27, 2026Updated last month
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆112Jan 12, 2024Updated 2 years ago
- Use AI to install penetration testing tool suites in one click.☆76Oct 5, 2025Updated 6 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆166Jun 19, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Discord.pyで作った、認証URLを踏ませてユーザー情報を保存できるタイプのバックアップBot☆33Nov 13, 2025Updated 5 months ago
- A ransomware for Android!☆49Sep 8, 2023Updated 2 years ago
- Web Tools for LINE☆18Dec 22, 2024Updated last year
- Osint-fb is a tool for searching for information gathering on Facebook with various available methods.☆50Oct 16, 2025Updated 6 months ago
- 🔍 Bug Bounty Search Engine - Advanced reconnaissance toolkit with 64+ Google dork queries organized into 10 categories for security rese…☆40Oct 6, 2025Updated 6 months ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 2 months ago
- A BloodHound OpenGraph collector that models Windows local privilege escalation as interconnected attack paths.☆470Mar 17, 2026Updated last month
- Custom Google search engine dedicated to IT security & hacking stuff. Over 240 high-quality sources.☆89Jan 15, 2026Updated 3 months ago
- Dumps the private keys from a wallet.dat file.☆11Oct 11, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆17Dec 21, 2024Updated last year
- HackGPT Enterprise is a production-ready, cloud-native AI-powered penetration testing platform designed for enterprise security teams. It…☆813Feb 14, 2026Updated 2 months ago
- Your Firefox, forged into steel. A user.js for a practical balance of security, privacy, and performance.☆13Mar 12, 2026Updated last month
- The Big Brother V4.0 is a weaponized OSINT platform featuring username enumeration (473+ platforms), quad-vector visual intelligence, Sky…☆573Mar 26, 2026Updated 3 weeks ago
- PayPay Unofficial api wrapper Library 🎁☆36Dec 4, 2024Updated last year
- Protect Java Code from Decompilation, beyond Obfuscation☆13Nov 23, 2020Updated 5 years ago
- Io4 Module enhancement for Mu3.☆18Apr 11, 2025Updated last year