Zurickata / INF236-2023-2-GRUPO-8View external linksLinks
☆25Aug 27, 2024Updated last year
Alternatives and similar repositories for INF236-2023-2-GRUPO-8
Users that are interested in INF236-2023-2-GRUPO-8 are comparing it to the libraries listed below
Sorting:
- ☆25Aug 27, 2024Updated last year
- ☆26Aug 27, 2024Updated last year
- ☆20Aug 15, 2024Updated last year
- ☆11Oct 29, 2024Updated last year
- .Santet online santet-online Features : 1.netcat payload 2.fb group hijacking 3.sms-bomber 4.sms-spoof 5.dos attack Installation : $ apt …☆10Jan 1, 2021Updated 5 years ago
- Wifi-admin panel pen test using termux☆25Dec 2, 2025Updated 2 months ago
- Send text messages using a spoofed phone number☆24Apr 26, 2019Updated 6 years ago
- Script for quick and easy DOS-attacks on bluetooth devices for pentest purposes☆42Aug 21, 2023Updated 2 years ago
- A Powerful Phishing Tool with 50+ phishing templates. For more about Dark-Phish tool please visit the website.☆296Sep 23, 2024Updated last year
- ShotDroid is a pentesting tool for android. There are 3 tools that have their respective functions, Get files from Android directory, int…☆441Apr 21, 2024Updated last year
- Android Keylogger + Reverse Shell☆457Apr 1, 2022Updated 3 years ago
- OSINT tool for finding email by first and last name☆545Nov 16, 2025Updated 3 months ago
- The source code of main tools used in Bitcoin "non-malware-based" attacks.☆550Jun 8, 2024Updated last year
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆651Aug 29, 2025Updated 5 months ago
- RomBuster is a router exploitation tool that allows to disclosure network router admin password.☆537Jul 18, 2024Updated last year
- A python based tool for exploiting and managing Android devices via ADB☆876Mar 12, 2023Updated 2 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆1,405Jan 9, 2024Updated 2 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,749Dec 9, 2025Updated 2 months ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,437Nov 3, 2018Updated 7 years ago
- ADB-Toolkit V2 for easy ADB tricks with many perks in all one. ENJOY!☆1,927Aug 18, 2024Updated last year
- Hacking tools pack & backdoors generator.☆1,979Feb 19, 2025Updated 11 months ago
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.☆2,318Feb 8, 2026Updated last week
- Phishing Campaign Toolkit☆2,505Jul 29, 2025Updated 6 months ago
- This is Advance Phishing Tool ! OTP PHISHING☆3,104Jan 5, 2026Updated last month
- Phishing Tool & Information Collector☆4,658Oct 29, 2024Updated last year
- Rewrite of the popular wireless network auditor, "wifite"☆7,602Aug 20, 2024Updated last year
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,508Feb 5, 2026Updated last week
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆15,368Aug 21, 2024Updated last year
- Open-Source Phishing Toolkit☆13,575Sep 23, 2024Updated last year
- Hydra Launcher is an open-source gaming platform created to be the single tool that you need☆15,202Updated this week
- The Rogue Access Point Framework☆14,435Feb 4, 2025Updated last year
- Enhanced ChatGPT Clone: Features Agents, MCP, DeepSeek, Anthropic, AWS, OpenAI, Responses API, Azure, Groq, o1, GPT-5, Mistral, OpenRoute…☆33,873Updated this week
- ALL IN ONE Hacking Tool For Hackers☆54,973Oct 14, 2025Updated 4 months ago
- Code at the speed of thought – Zed is a high-performance, multiplayer code editor from the creators of Atom and Tree-sitter.☆75,406Updated this week
- Build an event page for a real company!☆10Jun 8, 2018Updated 7 years ago
- xxtea☆16Sep 19, 2021Updated 4 years ago
- ☆11Feb 28, 2019Updated 6 years ago
- Declare the order in which Resque-based background tasks should run and implement them with blocks, using simple DSL, in ActiveRecord mod…☆10Jan 20, 2016Updated 10 years ago
- Generate random bitcoin wallets, private keys (seeds) and then check if they match a wallet that contains some kind of balance, and then …☆531Sep 29, 2023Updated 2 years ago