Quick example of how to break Snapchat's Captcha
☆147Mar 25, 2015Updated 10 years ago
Alternatives and similar repositories for FindTheGhost
Users that are interested in FindTheGhost are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆40Sep 27, 2021Updated 4 years ago
- ☆11Aug 12, 2021Updated 4 years ago
- Brute-Force-SnapChat By D1MOD1877☆39Feb 18, 2022Updated 4 years ago
- OSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accu…☆21Jun 12, 2021Updated 4 years ago
- Wordpress Plugins Scanner it's a semi-automatic white box pentesting/crawler app for WP plugins using RIPS from OWASP.☆14Aug 6, 2013Updated 12 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- A simple program to quickly and efficiently check accounts on snapchat,☆11Feb 5, 2023Updated 3 years ago
- Instainfo is a OSINT tool on Instagram Made in Python. It offers an interactive shell to perform analysis on Instagram account of any use…☆41Feb 6, 2026Updated last month
- A tool to list plugins installed on a wordpress powered website.☆11Jun 20, 2024Updated last year
- Scrape emails, phone numbers and social media accounts from a website. You can use the found information to gather more information or ju…☆15Dec 6, 2021Updated 4 years ago
- Private-Api-Snapchat-Hack-iOS---v1-Auth☆16Sep 29, 2015Updated 10 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Sep 18, 2020Updated 5 years ago
- Small Project :)☆18Oct 27, 2019Updated 6 years ago
- ☆15Jan 30, 2025Updated last year
- Automated solution to set up Termux environment quickly and effortlessly.☆10Jun 10, 2023Updated 2 years ago
- A tool for spamming Snapchat anonymous YOLO's.☆10Apr 11, 2021Updated 4 years ago
- Explore your activity on Google with R: How to Analyze and Visualize Your Personal Data Search History. Find out how and how much you hav…☆13Mar 13, 2021Updated 5 years ago
- Run commands in a remote system using Telegram chat. This let you control devices without open ports.☆13Aug 15, 2023Updated 2 years ago
- Search exploits in multiple exploit databases!☆12Feb 8, 2016Updated 10 years ago
- iOS tweak to disable Telegram Pornography/Copyright checks for Channels and Groups☆11Jun 20, 2020Updated 5 years ago
- Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]☆11Nov 14, 2020Updated 5 years ago
- Look for a backdoor shell on the website☆14Jul 17, 2018Updated 7 years ago
- Hacking instagram via phising☆17Jun 27, 2021Updated 4 years ago
- Instagram password bruteforcer☆16Jul 24, 2015Updated 10 years ago
- termux api usage☆14Apr 24, 2019Updated 6 years ago
- Docker image to build personal website with resume☆11Aug 16, 2022Updated 3 years ago
- Telegram messenger CLI Build Status Command-line interface for Telegram. Uses readline interface. API, Protocol documentation Document…☆12Jun 9, 2017Updated 8 years ago
- Development Environment Setup For Android using Termux☆13Jul 18, 2022Updated 3 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Mar 5, 2021Updated 5 years ago
- Docker image for hacking☆21Feb 10, 2025Updated last year
- A command line tool used to find the SnapChat usernames for known or unknown phone numbers☆10Sep 30, 2013Updated 12 years ago
- Launch hacking tests in cloud providers securely, isolated and without raise security alerts in the provider☆16Dec 12, 2017Updated 8 years ago
- Recursively calculates the hash of all files in a given path and checks them against the Virustotal threat database☆14Jun 30, 2023Updated 2 years ago
- SSH with a ADB port forward☆11Dec 17, 2023Updated 2 years ago
- A tool that can used for hacking :- reverse-shells, email-attacks, ip tracker and tracer.☆10Aug 3, 2022Updated 3 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- Acherus, The Docker Hold, is a containerized hacking environment gathering many tools and resources☆15Dec 29, 2025Updated 2 months ago