(Network Metadata Privacy) MAC Address spoofer with bonus combo (options): hostname + signal spoofer - *no disconnects!* Privacy Changing w/Brand Mimics: run as command or optional new randomized identity each boot; includes flags for continually changing random times/changing valid OUI addresses + Hostname randomizer + Device/Signal/location an…
☆55Jan 25, 2024Updated 2 years ago
Alternatives and similar repositories for wipri
Users that are interested in wipri are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detect credit card exposures with Bro☆15Nov 12, 2023Updated 2 years ago
- Experimenting with LoRa Backplate for PinePhone☆15Dec 7, 2021Updated 4 years ago
- Discover the simplicity and efficiency of Void Linux on your Android device with VoidMagic! 🚀☆11Dec 11, 2023Updated 2 years ago
- ☆10Jan 3, 2024Updated 2 years ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A badass grabbing tool for getting PDF's of books.☆26Aug 23, 2018Updated 7 years ago
- Target files to hack☆15Apr 21, 2020Updated 5 years ago
- Smishing Botnets Going Viral in Iran☆10Feb 19, 2022Updated 4 years ago
- This Is A Python Script That Forwards SMS Messages To A Discord Webhook☆11Feb 22, 2024Updated 2 years ago
- Fast setup wireguard server script, with tor, dnscrypt and adblocking, maleware blocking, more blocking if you need. Use case eg. always …☆55Jul 1, 2023Updated 2 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 11 years ago
- Anonymize UUIDs outputs (written in Golang)☆19Mar 25, 2026Updated 2 weeks ago
- Telegram phishing is for testing purposes only and the security of users is responsible for any misuse☆10Feb 20, 2021Updated 5 years ago
- A single-user database for Mac and iOS that provides multi-client synchronization using cloud storage☆12Dec 23, 2017Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Hack to fix PT_DENY_ATTACH on Mac OSX, updated for Snow Leopard.☆22May 9, 2012Updated 13 years ago
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- Python tools for ethical hacking☆45Jul 14, 2019Updated 6 years ago
- Multi-Mail-Sender☆10Dec 1, 2020Updated 5 years ago
- Revisiting Helpviewer.app to hack Parallels for Mac☆17Sep 14, 2019Updated 6 years ago
- A Swift/SwiftUI media player for jailbroken iOS devices.☆13Dec 21, 2023Updated 2 years ago
- Pwnagotchi on your laptop or netbook!☆11May 9, 2024Updated last year
- This code is designed to be used with the Macchina M2 (Arduino Due based). It uses OBD PID requests to run the gauge cluster in the Pors…☆12Feb 27, 2021Updated 5 years ago
- (Hacking-Tool), All tools in one!☆13Jul 5, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- ☆12Aug 3, 2020Updated 5 years ago
- proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, …☆35Sep 19, 2023Updated 2 years ago
- Keychain USB multiple password manager/generator/injector☆11Dec 7, 2015Updated 10 years ago
- Tool to Create Media Windows 10 Boot☆17Apr 4, 2022Updated 4 years ago
- ☆14Aug 14, 2022Updated 3 years ago
- Detects near-by devices such as cell phones, tablets, and laptops. Does this through 802.11, Bluetooth, cell phone protocols, etc..☆18Mar 24, 2014Updated 12 years ago
- Social media AI bot using computer vision to imitate human behaviors. Final project for Harvard Advance Python CSCI E-29 Fall 2020. Recei…☆10Sep 19, 2024Updated last year
- By LodCam tool you can generat phishing link of Loding site which can catch victim picture by victim front camera and and also gives you …☆21Aug 22, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Includes Kernel-mode driver source and usermode control application that sends requests to the hijacked device control, enjoy. Released t…☆12Oct 30, 2020Updated 5 years ago
- Support inspecting UIWebView/WKViewView for any process without debugging☆14Mar 14, 2024Updated 2 years ago
- Create a recycling calendar using the Recycle! API. Only works for Belgian addresses.☆14Apr 4, 2026Updated last week
- A bash script to easily run TOR hidden service on termux and most linux distros☆51Jul 6, 2023Updated 2 years ago
- Change the images on the ID in your Apple Wallet on iOS 14.0-16.5☆14Feb 1, 2024Updated 2 years ago
- XSS Worm which steals victim's cookies and some information also spread others. Written in js, php and java.☆10Dec 12, 2017Updated 8 years ago
- Camera Hack bot - Powered by XPH4N70M☆26May 26, 2023Updated 2 years ago