TCDG / Scammer-ToolBoxLinks
For scambaiters to have some fun
☆15Updated 8 years ago
Alternatives and similar repositories for Scammer-ToolBox
Users that are interested in Scammer-ToolBox are comparing it to the libraries listed below
Sorting:
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆9Updated 6 years ago
- New continually changing MAC spoofer concept to thwart trackers; randomizes mac address at random times) prevents WIFI access point locat…☆18Updated 4 years ago
- CyberGate Protector☆11Updated 8 years ago
- Fake WiFi Access Point with captive portal☆11Updated 2 months ago
- ☆17Updated 5 years ago
- Simple backdoor for public places, that uses a file system for communication. Just for fun! 😈☆55Updated 5 years ago
- ☆18Updated 3 years ago
- SLAE32 Assignment N°7 - Crypters☆10Updated 5 years ago
- RunAsAttached is a program to locally run a new terminal as another user without spawning a new console window.☆47Updated 3 years ago
- Colloide is a bruteforcing tool to find hidden pages, files and directories inside websites☆32Updated 3 years ago
- Asterisk Call Flooder☆26Updated 6 years ago
- ☆16Updated last year
- SkyRAT - Powershell Remote Administration Tool☆33Updated 7 years ago
- Tiny PHP script which creates a browsable ad-lib gallery from any directory with images reachable on a web server.☆15Updated last year
- Uma pequena coleção de malwares produzidos para atacar em território nacional☆15Updated 7 years ago
- Retreives the SSID names and passwords in cleartext for each Wifi network stored on the computer running this powershell script and outpu…☆83Updated 7 years ago
- IP Locator is a simple tool that allows you to find the geolocation of a device by its domain name or IP address☆15Updated 3 years ago
- A ADS/PREMIUM Spotify Cracker.☆17Updated 5 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- XLOCK Is a light, and powerful file locker that with features such as an interactive file interface, work in-progress shell with commands…☆13Updated 6 years ago
- iSpy Keylogger☆43Updated 8 years ago
- Bad bad bad bad bad stuff☆11Updated 6 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆26Updated 6 years ago
- SIP hacking tools and scripts☆23Updated 4 years ago
- Recursive Credit Card Searcher For Windows C++ and Linux☆13Updated 3 years ago
- StringEncrypt allows you to encrypt strings and files using a randomly generated algorithm, generating a unique decryption code (so-calle…☆22Updated 2 years ago
- Refluxion -- MITM WPA attacks tool☆37Updated 5 years ago
- SS-RAT (Schwarze-Sonne-Remote-Access-Trojan)☆25Updated 8 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago
- It is primary designed to be hidden and monitoring the computer activity. Take a screenshot of desktop in hidden mode using Visual C++ an…☆61Updated 4 years ago