ProgrammingHero1 / A5-Dev-Board
☆9Updated last month
Alternatives and similar repositories for A5-Dev-Board:
Users that are interested in A5-Dev-Board are comparing it to the libraries listed below
- Really useful hacking tools.☆15Updated last year
- Ransomware for demonstration☆15Updated 2 years ago
- This program is used to steal passwords on Google Chrome very easily with a message on a webhook discord.☆9Updated 3 years ago
- A java library to validate credit card information.☆8Updated 8 months ago
- Hax is a mini-tool with really useful hacking tools.☆18Updated last year
- Camera Hack bot - Powered by XPH4N70M☆18Updated last year
- Black-Tool-For-Windows☆15Updated 3 years ago
- Trojan written in C++ for Windows☆16Updated last year
- This tool named "InSta-Reseter" is mainly use to reset the Instagram Account Secure Accounts , All working apis are present in the script…☆13Updated last year
- python keylogger and spying malware .☆9Updated 2 years ago
- steal password mozilla firefox ,windows,Linux☆12Updated 4 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆27Updated last year
- A python trojan with spyware, info stealing and ransomware abilities.☆27Updated last year
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆20Updated 6 months ago
- This tool is used to find the admin login page of a website.☆16Updated 4 years ago
- List of OSINT resources☆15Updated 4 years ago
- Aynı ağ içerisinde , ARP Spoofing saldırısı yapılmış hedef bilgisayarın ziyaret ettiği , HTTP protokolünü kullanan web sitelerine kod enj…☆19Updated 4 years ago
- Just a quick'n'dirty tool to parse leaked databases (csv-like or sql format)☆24Updated 7 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- Access Windows 10 without password☆13Updated 4 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- Cannahome source code and database☆9Updated 2 years ago
- Curated list of ransomware-related resources; awesome style.☆16Updated 2 months ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆18Updated 3 years ago
- A Experimental Project On Permutations And Combinations For Bruteforce Algorithms☆11Updated 6 months ago
- SSH brute-forcing tool written in python☆15Updated 2 years ago
- Zip☆9Updated last year
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆24Updated 2 years ago
- This batch script reveal all Wi-Fi passwords saved in your computer.☆15Updated 2 years ago