☆35Mar 8, 2019Updated 7 years ago
Alternatives and similar repositories for Hatkey
Users that are interested in Hatkey are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PSHinjector autoscript is a tool that inject shellcode(x64 payload) by powershell with python3 programing☆30May 4, 2020Updated 5 years ago
- Facebook phishing page☆10Oct 4, 2020Updated 5 years ago
- Look for a backdoor shell on the website☆14Jul 17, 2018Updated 7 years ago
- ☆16Dec 9, 2018Updated 7 years ago
- ☆23Jan 21, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Control the parameters of an Android system with the power of Xposed framework. 通过Xposed框架控制Android参数。☆16Mar 24, 2017Updated 9 years ago
- ☆15Nov 11, 2021Updated 4 years ago
- ☆11Sep 28, 2017Updated 8 years ago
- EasySploit - Metasploit automation (EASIER and FASTER than EVER)☆381Jan 29, 2020Updated 6 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- From my YouTube Tutorial "How to create a flooder with python adn twilio☆10Mar 1, 2018Updated 8 years ago
- Install beef-xss from github☆18Jul 10, 2017Updated 8 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Dec 2, 2024Updated last year
- Keylogger builder written in C#☆11Jul 13, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Jan 15, 2015Updated 11 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- ☆31Jul 26, 2017Updated 8 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 7 years ago
- Python utility to export a user's starred repositories list into a CSV file☆17May 3, 2018Updated 7 years ago
- Facebook Phishing Undetected Desktop & Mobile Version (Greek_Locale)☆53Jul 25, 2020Updated 5 years ago
- 🀄️ WebShell Backdoor Framework☆16Jun 7, 2018Updated 7 years ago
- The following repo holds all scripts, apps, and documentation for InfoSec Red Team related activities.☆19Jun 24, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆13Oct 1, 2018Updated 7 years ago
- AutoDecoder tool for CTFs☆17Nov 4, 2018Updated 7 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- LotusCMS 3.0 eval() Remote Command Execution☆14Feb 10, 2013Updated 13 years ago
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 10 years ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- this script for fix problem vpn on kali linux "Rooling" only :)☆11Feb 17, 2017Updated 9 years ago
- Metasploit Framework☆10Apr 3, 2017Updated 9 years ago
- An tool for search IOT MQTT vulnerable with shodan☆21Sep 15, 2017Updated 8 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆13Apr 14, 2014Updated 12 years ago
- Self contained htaccess shells and attacks☆16May 18, 2018Updated 7 years ago
- A Simple JS and PHP Botnet☆30Mar 12, 2019Updated 7 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Sep 15, 2013Updated 12 years ago
- A RAR,ZIP and 7z password cracker☆19Jul 15, 2019Updated 6 years ago
- A tetris game coded in python.☆16Jul 31, 2022Updated 3 years ago
- A simulated WiFi capture the flag setup☆18Nov 1, 2022Updated 3 years ago