abpolym / mr-robotLinks
Imitating all commands in the Mr. Robot TV Series
☆78Updated 9 years ago
Alternatives and similar repositories for mr-robot
Users that are interested in mr-robot are comparing it to the libraries listed below
Sorting:
- Prints the IPs on your local network that're sending the most packets☆151Updated 4 years ago
- A password cracker for Portable PHP password hashes☆66Updated 5 years ago
- Social Engineering Tool Oriented to facebook☆56Updated 8 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆84Updated 4 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- WiFi Jamming tool☆101Updated 11 years ago
- OpenBank - Your BTC realtime tracker.☆74Updated 2 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Chat with hacker assistant☆194Updated 7 years ago
- A Cross-Platform Forensic Framework for Google Chrome☆70Updated 10 years ago
- A set of Python scripts for generating, parsing, sorting, and saving wordlists.☆51Updated 3 years ago
- php-cli vulnerability scanner☆78Updated 10 years ago
- ☆52Updated 13 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- Show info about the author by facebook photo url☆39Updated 8 years ago
- Jaidam is an open source penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or j…☆85Updated 7 years ago
- A Forensic Framework for Skype☆66Updated 8 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 9 years ago
- Open Source Python Keylogger Collection☆182Updated last year
- Automated man-in-the-middle attack tool.☆51Updated 10 years ago
- Shodan Firefox Add-on☆152Updated 4 years ago
- ARP spoof then session jack within your browser☆28Updated 11 years ago
- A ctypes powered python keylogger.☆106Updated 5 years ago
- Script for encrypting a GNU/Linux filesystem and then destroying the keys☆8Updated 7 years ago
- [BASH] Wardriving tool. Collect all the Wi-Fi wireless networks in a log file (csv format) skipping duplicate.☆18Updated 14 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- Social Engineering template for credential harvesting. (Facebook as an example).☆45Updated 7 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 9 years ago
- ☆120Updated 6 years ago