The-Cracker-Technology / afos-repoView external linksLinks
AFOS Package Manager
☆10May 2, 2021Updated 4 years ago
Alternatives and similar repositories for afos-repo
Users that are interested in afos-repo are comparing it to the libraries listed below
Sorting:
- Selam Gençler Bu tool ile günde 1 defa Gizli olarak (yabancı numaradan) sms atabilirsiniz.☆13Dec 8, 2020Updated 5 years ago
- Install Metasploit Framework 6 in Termux☆11Nov 28, 2020Updated 5 years ago
- BlackArch configuration for the bash shell.☆13Jan 11, 2021Updated 5 years ago
- ☆20Aug 16, 2019Updated 6 years ago
- ☆14Jan 9, 2023Updated 3 years ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- ☆11Feb 27, 2022Updated 3 years ago
- ATM Configurator aka Tyupkin trojan☆12Mar 23, 2015Updated 10 years ago
- Website☆12Jan 10, 2023Updated 3 years ago
- an NFC app show how to use NFC in Android☆10Oct 10, 2015Updated 10 years ago
- Layer 7 DDOS Script☆10Dec 29, 2018Updated 7 years ago
- A small React app that uses Firebase Authentication SDK v9 for authentication. https://fir-auth-18a81.web.app/☆10Sep 20, 2021Updated 4 years ago
- ☆16Nov 23, 2018Updated 7 years ago
- Open API Specification for the NFT APIs☆13Apr 5, 2020Updated 5 years ago
- ☆14Feb 10, 2020Updated 6 years ago
- ☆14Mar 8, 2021Updated 4 years ago
- It's DDOS tool☆13Aug 23, 2020Updated 5 years ago
- A guide on how to embed a tracking image into an email for investigation purposes☆19Feb 23, 2020Updated 5 years ago
- nothing☆18Jan 29, 2025Updated last year
- Samsung Galaxy S5 Neo☆17Oct 14, 2018Updated 7 years ago
- garlic os theme for the rg35xx retro emulation handheld 🧄 inspired by the dmg gameboy color palette☆17Jul 10, 2024Updated last year
- phonia (entynetproject)☆20Oct 28, 2020Updated 5 years ago
- This module uses the Metasploit framework built into Kali Linux to create a backdoor☆13Dec 3, 2020Updated 5 years ago
- Quack Toolkit is a set of a denial of service attack methods. Quack includes SMS attack method, HTTP attack method and many other attack …☆16Feb 12, 2020Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Dec 23, 2021Updated 4 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆20Jun 28, 2022Updated 3 years ago
- Sending an Email message using Fake data, this is a Free Premium Tool☆16May 8, 2020Updated 5 years ago
- Cara install pkg update && pkg upgrade $ pkg install python $ pkg install python2 $ pkg install curl $ git clone https://github.com/GUNAW…☆30Nov 5, 2018Updated 7 years ago
- ☆13Oct 28, 2024Updated last year
- ☆20Nov 2, 2019Updated 6 years ago
- ASNPepper - Recon in ASN - Extracting CIDR's - Fast and efficient scanning☆19Oct 27, 2024Updated last year
- Simple Python Script to bypass Facebook profile picture guard and get the profile picture at full resolution☆13Oct 23, 2019Updated 6 years ago
- This script for Instagram account checker😎😎😎.......And F*u*c*k Some account use this script 😉☆17Aug 17, 2020Updated 5 years ago
- haxtagram bruteforces instagram account faster than any other tool available!☆25May 19, 2024Updated last year
- Instructional Walkthrough video of how to create and launch your own 10k NFT collection without any Coding or Crypto knowledge.☆24Sep 18, 2021Updated 4 years ago
- Arch Linux Metasploit Framework Installation Script☆13Nov 28, 2019Updated 6 years ago
- How to New Powerful Tool Install for Tremux || 34 ATTACK [Type the Command :: Tab to Copy] $ apt update && apt …☆30Dec 27, 2020Updated 5 years ago
- Modified version of userrecon. Mod☆22Jul 18, 2020Updated 5 years ago
- ☆23Jan 29, 2023Updated 3 years ago