alifa2try / phunterLinks
Phone Number Gathering & OSINT Tool. Collects Phone Numbers and Performs OSINT on the Numbers. Only works on Nigerian Numbers at the moment.
☆11Updated 4 years ago
Alternatives and similar repositories for phunter
Users that are interested in phunter are comparing it to the libraries listed below
Sorting:
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆11Updated 2 years ago
- XSSRecon - Reflected XSS Scanner☆27Updated 4 years ago
- BAT is a tool to help everyone to securing their web-servers.☆12Updated 4 years ago
- A Simple Keylogger with the ability of FTP Transfer and Local Storage☆19Updated 9 months ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆25Updated 2 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated last year
- Hacking Tools Z0172CK☆31Updated last year
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆54Updated 4 years ago
- Web Application Vulnerability Scanner☆19Updated 6 years ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- Hax is a mini-tool with really useful hacking tools.☆18Updated 2 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- ☆19Updated 6 years ago
- NetScan is a Network Reconnaissance Tool for Windows/Linux/OSx etc Written in Python 3.☆23Updated 4 years ago
- Malduino compatible USB rubber ducky payloads☆14Updated 6 years ago
- Keylogger for ethical hackers☆15Updated 3 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 3 years ago
- An OSINT tool to search for accounts by username in social networks.☆17Updated 2 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆18Updated 4 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- 🌐🔍 Red Network Tool is a tool for network exploration and info finding.☆40Updated 3 years ago
- ☆17Updated 5 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 6 years ago
- ☆12Updated 2 years ago
- 🔥Ready, Aim, Fire.🔥☆16Updated 3 years ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆15Updated 2 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- ☆15Updated 3 years ago