LulzSec-Toolkit enables the user to have a menu with the most important tools. But this tool not only allows you to have the most important tools but also to have the most important commands of each tool so that it is easier for the user.
☆30Jun 24, 2020Updated 5 years ago
Alternatives and similar repositories for LulzSec-Toolkit
Users that are interested in LulzSec-Toolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆14Aug 8, 2024Updated last year
- GhostSec Scam Detection Tool☆17Feb 11, 2021Updated 5 years ago
- LulzSec FB Cracker ToolKit Bruter V0.1 tool written in perl to perform a dictionary-based attack on a specific Facebook user through HTTP…☆11Aug 14, 2017Updated 8 years ago
- ☆23May 2, 2026Updated last week
- vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal ,…☆14Nov 24, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆16Mar 28, 2023Updated 3 years ago
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Dec 19, 2021Updated 4 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆23Jan 20, 2018Updated 8 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆14May 8, 2021Updated 5 years ago
- ReFleX - Deep Image Recognition Bot☆24Oct 14, 2020Updated 5 years ago
- IP Tracking☆10Jul 1, 2019Updated 6 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Villain is a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other machin…☆19Dec 1, 2022Updated 3 years ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A collection of Ducky Script payloads.☆19Feb 29, 2020Updated 6 years ago
- Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, ad…☆15Aug 22, 2024Updated last year
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆15Apr 29, 2022Updated 4 years ago
- 📞 First ever OTP Bot maker for beginners. Generate your own OTP source in python or nodejs with any features you like!☆11Apr 21, 2023Updated 3 years ago
- ☆21Nov 5, 2011Updated 14 years ago
- The source code of iDecryptIt - an IPSW firmware decryption tool☆17Mar 11, 2026Updated last month
- CUPP - Common User Passwords Profiler !☆15Jun 14, 2024Updated last year
- WebSecurityVision is a tool for checking XSS vulnerabilities and security headers in web applications, displaying browser information if …☆11Apr 6, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- pycaret-git-actions☆17Aug 6, 2020Updated 5 years ago
- Pimp my Kali but for lazy AFKers☆12Jun 18, 2023Updated 2 years ago
- [RELEASED] A CLI tool for large-scale password recovery operations using AWS☆30Jul 25, 2023Updated 2 years ago
- python based latest zombie bot v.14☆19Mar 23, 2021Updated 5 years ago
- Write up for the CyberTalents 2017 qualifications round☆12Apr 13, 2017Updated 9 years ago
- ☆14Feb 15, 2022Updated 4 years ago
- 🔮 Uncover parts of mutuals followers of an instagram private account☆17Mar 31, 2022Updated 4 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Feb 1, 2022Updated 4 years ago
- steal cookies from website using xss☆12Mar 25, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- A demonstration on how to authenticate yourself against the sipgate REST API using HTTP Basic Auth, which returns basic account informati…☆14May 21, 2024Updated last year
- Short add-on to termux to enable phone-calls using contact book and auto-completion☆12Sep 24, 2020Updated 5 years ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆23Aug 25, 2024Updated last year
- Find open databases - Powered by Binaryedge.io☆14Jan 4, 2020Updated 6 years ago
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Nov 21, 2014Updated 11 years ago