THIS REPOSITORY ONLY MADE FOR PROVIDING SPOOFING CALL AND EMAIL
☆12Oct 1, 2023Updated 2 years ago
Alternatives and similar repositories for Spoofing
Users that are interested in Spoofing are comparing it to the libraries listed below
Sorting:
- Studying BlueBorne vulnerability at university-student level.☆15Nov 3, 2019Updated 6 years ago
- solution of love babbar dsa sheet or sde sheet solution in java☆13Jul 25, 2023Updated 2 years ago
- Wi-Fi Credentials Extractor is a tool developed in Batch and PowerShell to extract saved Wi-Fi passwords and network details from a compu…☆10Jan 19, 2025Updated last year
- Line of business tooling for VOIP services.☆11Feb 22, 2026Updated last week
- ✨Special✨☆10Feb 24, 2026Updated last week
- TikSub adalah alat berbasis Python yang memanfaatkan platform Traodoisub untuk menukar koin menjadi followers, likes, dan views TikTok. C…☆17Aug 9, 2025Updated 6 months ago
- ADBSploit - A tool for Android device exploitation and management via ADB. Connects via USB/IP, controls apps/media/files, and supports F…☆13Apr 5, 2025Updated 10 months ago
- Zombie Bot from Darkweb☆11Jan 22, 2022Updated 4 years ago
- A simple bash script to install and run tor in linux☆12Nov 2, 2023Updated 2 years ago
- When you run it, it will save all stored Google Chrome passwords in Passwords.txt☆12Jun 12, 2023Updated 2 years ago
- Live demonstration buttons for https://developers.google.com/pay/api/web/guides/resources/demos☆11Feb 22, 2026Updated last week
- Portfolio☆10Feb 2, 2026Updated last month
- Autoconnect MSR-100 Magnetic Stripe Card Reader and returns CardInfo on Swipe event.☆13Sep 26, 2022Updated 3 years ago
- Scrape full name, last post date, location, and private/public status of followers of desired Instagram account.☆10Aug 9, 2021Updated 4 years ago
- This project is for internal purposes only and not meant to be public; it is not meant to be made private either. Such is life—complicate…☆14Jul 22, 2025Updated 7 months ago
- The repo contains publicly available malware analysis and reversing resources.☆12Oct 13, 2025Updated 4 months ago
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated 11 months ago
- launch spiderfoot easily from any terminal!☆15Oct 31, 2023Updated 2 years ago
- A Jekyll theme based on tufte-css, in the style of Edward Tufte☆20Dec 9, 2022Updated 3 years ago
- DDos Web By NgDangTr☆14Oct 23, 2022Updated 3 years ago
- ☆13Dec 21, 2019Updated 6 years ago
- A fully original Windows anti-virus client from HonestRepair using the same custom antivirus engine as our Cloud.☆16Dec 19, 2019Updated 6 years ago
- A WiFi hacking Phishing tool for everyone.☆15Mar 31, 2023Updated 2 years ago
- checks various security features of a system, including firewall, intrusion detection system (IDS),Intrusion Prevention Systems (IPS), Ne…☆11Feb 21, 2023Updated 3 years ago
- bash script to automate wardriving tasks. (Wi-Fi & Bluetooth)☆11Feb 14, 2023Updated 3 years ago
- Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts sil…☆16Mar 30, 2023Updated 2 years ago
- *This is only for educational purposes, I'm not responsible for anything whatsoever made using those actually malicious software* A malwa…☆13Nov 7, 2021Updated 4 years ago
- Hey guys This a bash script tool to connect ssh Easily without any commands☆11Dec 6, 2023Updated 2 years ago
- a simple keylogger that records hardware inputs like keyboard, mouse, microphone and webcam and sends it to your e-mail.☆14Oct 18, 2024Updated last year
- Select which local O/S to boot by asking a network server☆14Jul 4, 2018Updated 7 years ago
- A simple phishing maker that converts the website source code into a phishing website☆13Aug 25, 2022Updated 3 years ago
- Best alternative of TBomb tool with unlimted feature and stop call and msg of victim number made by guccifer shubham☆15Jul 24, 2022Updated 3 years ago
- A Simple dos attack program implementation using java☆12Jan 28, 2023Updated 3 years ago
- Cornell box rendering using raytracing and rasterisation☆12May 20, 2015Updated 10 years ago
- An encoder that makes strings invisible, replaces ASCII characters with zero-width unicode characters, also has an edited base64☆17May 3, 2022Updated 3 years ago
- Accounts Payable Bot using Azure Bot Service☆12Apr 26, 2019Updated 6 years ago
- This script exploits a vulnerability related to insecure file uploads, specifically targeting web applications that allow users to upload…☆14Feb 28, 2024Updated 2 years ago
- Freeunix is a UNIX-like Operating System that is currently solely developed and maintained by me and uses Limine as the bootloader.☆15Dec 24, 2023Updated 2 years ago
- Call API from Zspoof is a tool which is used for spoofing calls. This tool lets you to call anyone by changing callerid.☆17Sep 10, 2023Updated 2 years ago