TheSpeedX / fraudsterLinks
Disposable Mails From Command Line
☆32Updated 5 years ago
Alternatives and similar repositories for fraudster
Users that are interested in fraudster are comparing it to the libraries listed below
Sorting:
- Advance Google Dorker and Vulnerability Scanner☆48Updated 6 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆33Updated 7 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆47Updated 2 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- Bing Dork Scanner and simple sqli-injection checker☆16Updated 7 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- simple script to pwn android phone with physical access☆25Updated 6 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- Recursive Credit Card Searcher For Windows C++ and Linux☆13Updated 5 years ago
- An advance keylogger that works and also logs special keys.☆19Updated 3 years ago
- This project is a continuation of the Moriarty project. But this osint website, has more feautres than Moriarty has☆33Updated 4 years ago
- Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.☆34Updated 4 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Updated 7 years ago
- [BASH] Password generator through a wordlist☆11Updated 12 years ago
- facebook bot ,like comment,download phone number, download email adress, delect all friends ...........etc☆20Updated 5 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆38Updated 6 years ago
- Smart pentesting toolkit for modern WPA/WPA2 networks ⚔️📡☆28Updated 4 years ago
- Open-source advanced cracking tool made in Electron.JS☆18Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆55Updated 7 years ago
- 19 Social Media Phishing Pages #phishing #shellphish #phish☆14Updated 4 years ago
- ☆12Updated 3 years ago
- A Simple Keylogger☆18Updated 6 years ago
- Payload delivery via URL and some social engineering.☆17Updated 10 months ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆18Updated 2 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆45Updated 6 years ago
- Just a quick'n'dirty tool to parse leaked databases (csv-like or sql format)☆25Updated 7 years ago
- Refluxion -- MITM WPA attacks tool☆36Updated 4 years ago
- [ Multi Encryption / Decryption ]☆20Updated 5 years ago