abpolym / mr-robotLinks
Imitating all commands in the Mr. Robot TV Series
☆81Updated 10 years ago
Alternatives and similar repositories for mr-robot
Users that are interested in mr-robot are comparing it to the libraries listed below
Sorting:
- Prints the IPs on your local network that're sending the most packets☆152Updated 4 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Detect snooper on your system!☆85Updated 8 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆84Updated 4 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- A ctypes powered python keylogger.☆107Updated 6 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆67Updated 10 years ago
- A set of Python scripts for generating, parsing, sorting, and saving wordlists.☆50Updated 4 years ago
- Social Engineering Tool Oriented to facebook☆58Updated 8 years ago
- Chrome Keylogger Extension☆166Updated 10 years ago
- Jaidam is an open source penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or j…☆84Updated 7 years ago
- A password cracker for Portable PHP password hashes☆67Updated 5 years ago
- Automated man-in-the-middle attack tool.☆52Updated 11 years ago
- Take full control of a OSX user or root account via command line.☆100Updated 7 years ago
- php-cli vulnerability scanner☆78Updated 10 years ago
- A facebook profile and reconnaissance system☆57Updated 11 years ago
- ☆53Updated 13 years ago
- A Cross-Platform Forensic Framework for Google Chrome☆71Updated 10 years ago
- Social Engineering template for credential harvesting. (Facebook as an example).☆45Updated 7 years ago
- Show info about the author by facebook photo url☆40Updated 8 years ago
- WiFi Jamming tool☆103Updated 12 years ago
- ARP spoof then session jack within your browser☆28Updated 11 years ago
- A secure, browser-side encrypted pastebin.☆60Updated 5 years ago
- Chat with hacker assistant☆195Updated 8 years ago
- [BASH] Wardriving tool. Collect all the Wi-Fi wireless networks in a log file (csv format) skipping duplicate.☆18Updated 14 years ago
- Transparently Routing Traffic Through Tor☆64Updated last year
- A few simple scripts and templates I have used during various phishing engagements.☆59Updated 10 years ago
- Exploit pack for pentesters and ethical hackers.☆116Updated 8 years ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Updated 9 years ago
- Simple brute forcing in Python.☆104Updated 2 years ago