S4Y4N / Trity
Most advanced framework yet! From spoofing to cryptography, Trity has it all!
☆42Updated 7 years ago
Alternatives and similar repositories for Trity:
Users that are interested in Trity are comparing it to the libraries listed below
- Gloom-Framework :: Linux Penetration Testing Framework☆50Updated 7 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 3 years ago
- PHP SMS Sender Only Script And API☆26Updated 7 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆29Updated 6 years ago
- Collection of white, grey and blackHat tools - for use playing around. setting up and operating pentesting linux builds - Primarily Kali-…☆18Updated 6 years ago
- Password Attack Toolkit☆16Updated 6 years ago
- Python Security/Hacking Kit☆41Updated 5 years ago
- Angry IP Scanner Jar File☆24Updated 7 years ago
- Hacking Tools For All Debian-based OS☆46Updated 6 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Updated 8 years ago
- E-mails, subdomains and names Harvester - OSINT☆13Updated 6 years ago
- A Metasploit payload that will connect to the victim and open up a permanent backdoor to their phone.☆48Updated 8 years ago
- A collection of scripts to run on a fresh install of kali linux☆32Updated 6 years ago
- Hacking Tools☆45Updated 6 years ago
- ☆30Updated 8 years ago
- A little explanation about this tool, Lazymux is a remote that works to automatically download and install a tool ,, what content do I me…☆18Updated 7 years ago
- Fsociety For Android And NetHunter Version☆61Updated 6 years ago
- RouterBrute can Bruteforce/Dictionary attack the login for the Router's Login page☆15Updated 7 years ago
- Basic python script for detect airdroid users in lan☆47Updated 4 years ago
- Hercules - Automated VPN Connect ✔️☆48Updated 6 years ago
- A remote keylogger with some cool features☆44Updated 5 months ago
- package for facebook predection password☆14Updated 8 years ago
- SMS Spoofer for Social Engineering/Pentest Engagements☆46Updated 7 years ago
- Clone a voice in 5 seconds to generate arbitrary speech in real-time☆18Updated 4 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11Updated last year
- A simple vuln web scanner☆39Updated 6 years ago
- Social Engineering Toolkit☆107Updated 3 years ago