Generate Malicious QR or similar
☆16Jun 7, 2023Updated 2 years ago
Alternatives and similar repositories for EvilQR
Users that are interested in EvilQR are comparing it to the libraries listed below
Sorting:
- This is a program written in python which allows you to log in with different sql injections that allow you to bypass some login pages (F…☆12Feb 23, 2023Updated 3 years ago
- Bxi crack version☆10Jul 7, 2022Updated 3 years ago
- Facebook Bruteforce tool on python 🔐☆15Oct 14, 2024Updated last year
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆11May 14, 2025Updated 9 months ago
- Dark-Hydro es una herramienta de osint completa para un numero telefonico.☆35Apr 14, 2024Updated last year
- Instagram account information☆14Sep 18, 2022Updated 3 years ago
- New Updated OK IDs File Crack Tools 🔥☆24Dec 26, 2022Updated 3 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Oct 13, 2020Updated 5 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Jul 9, 2012Updated 13 years ago
- CodeX Tool is to Convert Phishing URL to qr code !☆16Feb 16, 2021Updated 5 years ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- Advance DDOS attack detector tool written completely on Python3☆28Jun 11, 2022Updated 3 years ago
- ☆10Nov 21, 2024Updated last year
- ☆11Jun 28, 2022Updated 3 years ago
- THIS IS A WITHOUT LOG IN OLD ID CLONING TOOL BY HUNTERBOY ENJOY GUYS😍🥰☆38Mar 12, 2022Updated 3 years ago
- GDorks Web is a Flask-based web application that allows users to browse and retrieve random Google Dorks from the GDorks repository on Gi…☆11Jul 24, 2025Updated 7 months ago
- SCRIPT TERMUX HACK AKUN FACEBOOK☆17Jul 27, 2024Updated last year
- A network attack using Evil Twin Framework paired in NodeMCU ESP8266 device to exploit vulnerabilities in WiFi with low cost☆14Jul 25, 2023Updated 2 years ago
- Script Open Source Facebook Crack Indonesia👾💥☆12Jan 6, 2024Updated 2 years ago
- ☆12Jan 25, 2018Updated 8 years ago
- Automatically exported from code.google.com/p/java-card-desfire-emulation☆16Jan 11, 2016Updated 10 years ago
- ShellValley is a user-friendly reverse shell generator tool, specially designed for CTF players who prefer to stay within their terminal …☆12Aug 11, 2023Updated 2 years ago
- An OSINT tool to easily generate Facebook url's to access publicly available information from Facebook profiles☆12Feb 22, 2017Updated 9 years ago
- Leech Tools (Free Version) provides fraud tools such us Credit Card Generator, Bank Identification Number Lookup and Credit Card Validity…☆11May 9, 2019Updated 6 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Kali Linux Tools - The Collection of tools.☆10Jun 26, 2020Updated 5 years ago
- WigleAPI-JSON in PHP with JSON Response☆14Nov 18, 2013Updated 12 years ago
- ☆11Oct 20, 2018Updated 7 years ago
- Boscloner - All in One RFID Cloning Toolkit☆16Apr 14, 2017Updated 8 years ago
- Little repo with my CS2 config and some of things I do to make the game run optimally.☆13Feb 20, 2025Updated last year
- Man-in-the-middle device for attacking RFID access control systems☆16Feb 7, 2023Updated 3 years ago
- In photographic media, faces are often obfuscated to protect the identity of those pictured. This obfuscation process is done by removing…☆12Jan 10, 2019Updated 7 years ago
- ☆13May 3, 2020Updated 5 years ago
- Malware and malicious applications database☆38Jun 12, 2024Updated last year
- WiFi Pineapple Community Packages☆12Nov 6, 2022Updated 3 years ago
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆24Jan 19, 2026Updated last month
- Professional Open Source Intelligence Platform☆15Sep 15, 2025Updated 5 months ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year