Pilfer / iDictPyLinks
A salty-ass 100% verified hacker status python script to turn apple id's into apple crisp #nicememe
☆43Updated 5 years ago
Alternatives and similar repositories for iDictPy
Users that are interested in iDictPy are comparing it to the libraries listed below
Sorting:
- Password cracking utility☆53Updated 4 years ago
- Decrypts local iOS backups and recreates file system, with a framework for automatically extracting useful information☆43Updated 9 years ago
- Python script for decrypting stored images from Snapchat version 5.0.34.nn☆243Updated 3 years ago
- ☆69Updated 13 years ago
- Show info about the author by facebook photo url☆39Updated 8 years ago
- Extraction of iMessage Data via XSS☆53Updated 9 years ago
- iOS forensic tool☆65Updated 11 years ago
- Dump the iOS Frequent Location binary plist files☆85Updated 6 years ago
- IOS hacking stuff☆174Updated 12 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- Social Engineering Tool Oriented to facebook☆56Updated 8 years ago
- Collect Apple ID's straight from Apple's Login Form☆20Updated 8 years ago
- The development place of AFFT, a toolkit to automatically acquire and extract data from Android image dumps☆46Updated 9 years ago
- A python script for obfuscating wireless networks☆78Updated 8 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆35Updated 9 years ago
- Automated man-in-the-middle attack tool.☆50Updated 10 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- ARP spoof then session jack within your browser☆28Updated 11 years ago
- Scripts I use to setup a new macOS or Linux machine for iOS research☆17Updated 6 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 8 years ago
- Hacking environment installation scripts for OS X☆26Updated 3 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Updated 11 years ago
- A phishing attack for Macs that copies the victim's password and keychain to the Public folder.☆45Updated 8 years ago
- Bypassing Android Pattern Lock☆68Updated 11 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Updated 10 years ago
- Python OSINT Tool to retrieve information from Skype☆76Updated 9 years ago
- ☆12Updated 10 years ago
- Fast iOS executable dumper☆27Updated 11 years ago
- ☆13Updated 10 years ago
- iCloud Bruteforce PoC - with MultiCurl☆255Updated 9 years ago