A simple script to generate a hidden url for social engineering.
☆122Aug 11, 2020Updated 5 years ago
Alternatives and similar repositories for URLCADIZ
Users that are interested in URLCADIZ are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Your eyes on the target - SPY☆25Jul 24, 2020Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆247Aug 14, 2024Updated last year
- proxphish is a advanced phishing tool☆16Jan 6, 2021Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The program is designed to obfuscate the shellcode.☆204Jul 13, 2021Updated 4 years ago
- b0mb3r crinny☆16May 31, 2021Updated 4 years ago
- JavaScript (Node) Call Flooder☆13Mar 11, 2021Updated 5 years ago
- Web Application Vulnerability Scanner☆134Sep 25, 2020Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- Simple Python Script to bypass Facebook profile picture guard and get the profile picture at full resolution☆13Oct 23, 2019Updated 6 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆111Apr 24, 2020Updated 5 years ago
- bingip2hosts is a Bing.com web scraper that discovers websites by IP address☆138May 3, 2022Updated 3 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- XCTR Hacking Tools☆41Aug 4, 2021Updated 4 years ago
- Tools Auto installer from Darkness Cyber Team We Security We Not Friends We Are Family☆199Oct 27, 2019Updated 6 years ago
- A backdoor with a multitude of features.☆294Oct 3, 2024Updated last year
- This tool is design to find admin panel of any website by using custom wordlist or default wordlist easily and allow you to find admin pa…☆166Dec 20, 2020Updated 5 years ago
- Perform automated network reconnaissance scans☆238May 4, 2023Updated 2 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆506Mar 11, 2024Updated 2 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- Hacking Tools Z0172CK☆30Jul 11, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆148Jul 12, 2020Updated 5 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆47Nov 1, 2022Updated 3 years ago
- Hack any Instagram account through bruteforce.☆11Sep 24, 2021Updated 4 years ago
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- Simple Python Decoders☆12Sep 5, 2020Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Jan 7, 2021Updated 5 years ago
- A python script which allows you to parse GeoLocation data from your Image files stored in a dataset.It also produces output in CSV file …☆42Dec 20, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- adding a backdooruser using win32api☆81Sep 3, 2020Updated 5 years ago
- ☆95Feb 25, 2020Updated 6 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 6 years ago
- XSHOCK Shellshock Exploit☆87Dec 8, 2022Updated 3 years ago
- Reconnaissance and Enumeration automation script☆53Mar 16, 2021Updated 5 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆62May 2, 2020Updated 5 years ago