This is the updated version of blackeye with ngrok
☆60Oct 7, 2020Updated 5 years ago
Alternatives and similar repositories for blackeye
Users that are interested in blackeye are comparing it to the libraries listed below
Sorting:
- The most complete Phishing Tool, with 32 templates +1 customizable☆609Jul 2, 2021Updated 4 years ago
- Succeser of blackeye v1.0, phishing tool with new 10 page added☆110Jul 3, 2022Updated 3 years ago
- BlackEye Phishing Kit in Python w Serveo Subdomain Creation | Educational Purposes Only☆552Sep 4, 2023Updated 2 years ago
- User Recon Find usernames across over 75 social networks This is useful if you are running an investigation to determine the usage of the…☆15Feb 8, 2021Updated 5 years ago
- New Version Hack script For mining ESCOIN free☆10Apr 25, 2022Updated 3 years ago
- This is a Phishing tool. Phishing is a type of hacking also called credential harvesting. It creates fake websites for victims to login w…☆128Feb 25, 2023Updated 3 years ago
- ⍺-MON anonymizes network traffic in real time. This software process network traffic on input interfaces to remove privacy sensitive info…☆12Sep 27, 2021Updated 4 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- Double-free vulnerability in DDGifSlurp in decoding.c in libpl_droidsonroids_gif can read more https://awakened1712.github.io/hacking/hac…☆16Oct 23, 2019Updated 6 years ago
- Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]☆99Sep 8, 2020Updated 5 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- kali linux, termux hacking tools☆17Jan 4, 2020Updated 6 years ago
- Maltego transformation for TON investigations☆24Jan 1, 2024Updated 2 years ago
- This write-up will provide detailed description on how to bypass Guided Access mode on Apple iPhones.☆21Apr 23, 2018Updated 7 years ago
- black eye code https-github.com-x3rz-blackeye☆26Apr 1, 2021Updated 4 years ago
- Alien Logger is a MaaS (Malware as a Service) website offering an easier to use alternative from the traditional keylogger.☆28Oct 31, 2021Updated 4 years ago
- Tool to easily get someone's ip, through instagram. Using NGL template and f3☆23Jun 27, 2024Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆21Jan 5, 2021Updated 5 years ago
- A Python/Scapy based ARP Cache Poisoning tool.☆12Apr 3, 2016Updated 9 years ago
- The Android Debug Bridge (ADB) is used to: * keep track of all Android devices and emulators instances connected to or running on a given…☆21Oct 21, 2025Updated 4 months ago
- This Tools installs many famous phising tools on your termux By one click It contains SocialFish. Weeman. HiddenEye. ShellFish. Black…☆84Jul 11, 2021Updated 4 years ago
- This tool is a discord autospreader, meaning once infected it will grab the token of anyone on the pc, grab their friends, and send itsel…☆34Apr 28, 2022Updated 3 years ago
- ☆31May 22, 2024Updated last year
- Tool to Disable User Lock☆25Nov 22, 2022Updated 3 years ago
- Qbot Source, Scanners, loaders....☆13Jul 2, 2023Updated 2 years ago
- A Web3-based news aggregator that fetches the latest blockchain, DeFi, and NFT news from various sources. Features sentiment analysis and…☆19Feb 12, 2025Updated last year
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆94Aug 1, 2022Updated 3 years ago
- PhantomsGate: Advanced Shellcode Injection Technique☆27Jul 15, 2024Updated last year
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Jul 21, 2020Updated 5 years ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆15Dec 18, 2021Updated 4 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- A ProJect aim to creat a BlackEye(Rainbow six)☆39Mar 11, 2020Updated 6 years ago
- ☆34Jun 9, 2024Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 4 months ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Apr 30, 2023Updated 2 years ago