Simple Penetration Testing Multitool For Beginners.
☆60Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for multitool
Users that are interested in multitool are comparing it to the libraries listed below
Sorting:
- A collection of useful Python hacking scripts for beginners.☆17Apr 20, 2021Updated 4 years ago
- Bug Hunting Penetration RGB Hat are red, gray, and black hat☆19Jan 21, 2026Updated 2 months ago
- create unlimited passwords to brute force any account! This tool is created only for educational purpose.☆28Apr 30, 2023Updated 2 years ago
- Cypher-Multitool is a 'Hacking' Multitool written by me in Batch, don't steal the source code :). It's a MINI version of it, the MEGA ver…☆26Oct 12, 2020Updated 5 years ago
- Collection of Python Scripts☆189Nov 12, 2024Updated last year
- Scripts Python for hacking☆14Dec 24, 2024Updated last year
- Fake-sms☆27Jun 21, 2025Updated 9 months ago
- A Windows batch file multi-tool that aids you in your experience with a Windows Machine.☆10Dec 10, 2021Updated 4 years ago
- Information Gathering Simplified.☆82Jan 17, 2023Updated 3 years ago
- ☆16Oct 26, 2021Updated 4 years ago
- Astri is a multitool written in python, it contains tools with different applications and is an excellent resource to find reliable sites…☆113Jun 18, 2025Updated 9 months ago
- RaidHammer - An utility for Easily banning multiple hate raid accounts☆13Apr 20, 2023Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- Save contacts that you want don't want to show on the dailer. Black Book for saving contacts in python☆10Apr 30, 2023Updated 2 years ago
- File Clonnig☆12Apr 18, 2024Updated last year
- 👺hacking is demonic👺☆21Jan 8, 2024Updated 2 years ago
- Discord MultiTool made entirely with python 3.9☆14Aug 5, 2022Updated 3 years ago
- A Python3 discord trojan, utilizing discord webhooks for sending information. Silent stealer, meaning this is intended for the person to …☆13Feb 8, 2022Updated 4 years ago
- Facebook Random Number Id Cloning, No Login Need☆28Oct 30, 2022Updated 3 years ago
- ☆14Aug 4, 2025Updated 7 months ago
- Social Scraper is a python tool meant for Detection of Child Predators/Cyber Harassers on Social Media☆62Sep 3, 2020Updated 5 years ago
- CoinBlock blocks services like CoinHive from using your browser to mine cryptocurrency without your consent.☆12Oct 15, 2017Updated 8 years ago
- Discord Raiding Tool written in python.☆11Oct 17, 2021Updated 4 years ago
- A repo containing some stagers and setup scripts for configuring Salt Stack to be a "bad"-ass C2☆18Jan 3, 2020Updated 6 years ago
- ☆11Jul 13, 2022Updated 3 years ago
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆136Oct 28, 2025Updated 4 months ago
- A minimal keylogger that accurately tracks keyboard strokes made in Python☆24Feb 23, 2021Updated 5 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- INSTAGRAM DM BOT | MULTI-THREADING REQUESTS BASED | PROXY SUPPORT☆74Sep 5, 2024Updated last year
- A series of exquisite and compact web page cool effects. With repository stars⭐ and forks🍴☆26Mar 14, 2026Updated last week
- Python tool (and library) to sign/verify files with RSA, Ed25519, or EC/secp256k1 keys☆14Apr 16, 2021Updated 4 years ago
- Key-value store using iOS Reminders for persistence and distribution across iOS devices.☆12May 10, 2018Updated 7 years ago
- Get All Registered Wifi Passwords from Target Computer.☆702Jan 30, 2024Updated 2 years ago
- Home lab setup and config☆10Mar 18, 2021Updated 5 years ago
- SoulTaker is a Open-Source MultiTool written by myself, contains a lot of things such as a phone spoofer, ip lookup, dox tool etc.☆339Sep 27, 2020Updated 5 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Oct 10, 2020Updated 5 years ago
- Automatically scans nearby WiFi networks, de-authenticates clients and tries to capture the four way handshake that can be later used to …☆20Aug 9, 2025Updated 7 months ago
- ☆17Oct 2, 2021Updated 4 years ago
- Repo to storage all my favorite links☆16May 22, 2017Updated 8 years ago