A USB-based script for Ethical hacking with multiple attacks
☆49May 6, 2023Updated 2 years ago
Alternatives and similar repositories for tsuki-sploit
Users that are interested in tsuki-sploit are comparing it to the libraries listed below
Sorting:
- Nethunter kernel for Samsung galaxy S9/S9 plus [exynos9810]☆17Oct 16, 2021Updated 4 years ago
- Pwnagotchi Updated Bruteforcer with UI☆23Dec 12, 2025Updated 2 months ago
- Gluetun VPN Randomizer☆28Oct 28, 2024Updated last year
- Sends a verify code to your email from microsoft☆13Aug 17, 2025Updated 6 months ago
- An account hacking program with some built-in action keywords.☆14Apr 1, 2021Updated 4 years ago
- ☆21Feb 12, 2026Updated 2 weeks ago
- ☆23Jul 5, 2020Updated 5 years ago
- hacking framework complete source-code for web, wifi, url, sql-injection and doing a complete web scan for starters.☆30Dec 8, 2022Updated 3 years ago
- Performing website vulnerability scanning using OpenAI technologie☆67Apr 5, 2025Updated 10 months ago
- phishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, …☆76Jan 7, 2022Updated 4 years ago
- This Arduino sketch (WIP) turns an ESP32 into a dynamic Pwnagotchi trainer, generating random Wi-Fi networks, broadcasting beacon frames,…☆29May 13, 2025Updated 9 months ago
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- The ultimate phishing tool with 38 websites available!☆14Nov 7, 2024Updated last year
- wireless rubber ducky for raspberry pico w☆40Oct 5, 2023Updated 2 years ago
- Telegram base free Rat☆12Apr 26, 2025Updated 10 months ago
- Termux - a terminal emulator application for Android OS extendible by variety of packages.☆11Jan 8, 2023Updated 3 years ago
- ☆12Oct 1, 2021Updated 4 years ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- KaliAI is an advanced AI assistant designed to help security professionals and ethical hackers leverage Kali Linux tools effectively and …☆22Mar 25, 2025Updated 11 months ago
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago
- Xamarin Native Android app sample for tracking device sensors data. Position Tracker dectects GPS location, Accelerations, Accurency, Spe…☆11Sep 25, 2019Updated 6 years ago
- Remake Of The USB Rubber Ducky In Python With Better Features. Steals IPv4+IPv6 And Other IPs, And Browsing History From: Brave, Microsof…☆14Oct 5, 2024Updated last year
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- Automatically exported from code.google.com/p/java-card-desfire-emulation☆16Jan 11, 2016Updated 10 years ago
- Efficiently manage and track your job application history☆13May 1, 2025Updated 10 months ago
- This script allows you to create a hidden admin account on your victim's PC.☆43Feb 8, 2025Updated last year
- Splunk app to monitor the /etc directory of Splunk for all changes of .conf files☆13Jan 26, 2018Updated 8 years ago
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆11Oct 17, 2020Updated 5 years ago
- Before using Emagnet, please remember that with great power comes great responsibility.☆22Mar 30, 2025Updated 11 months ago
- A network attack using Evil Twin Framework paired in NodeMCU ESP8266 device to exploit vulnerabilities in WiFi with low cost☆14Jul 25, 2023Updated 2 years ago
- A Python Script that can DOS or ShutDown WiFI Network☆13Apr 11, 2022Updated 3 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- Repository of wordlists and dictionaries for fuzzing and bruteforcing☆10Aug 17, 2020Updated 5 years ago
- WiFi Pineapple Community Packages☆12Nov 6, 2022Updated 3 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- ☆16Sep 25, 2025Updated 5 months ago
- Find alive hosts by scanning IP addresses☆12Jun 18, 2020Updated 5 years ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago