andyvaikunth / roxysploit
A Hackers framework
☆117Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for roxysploit
- CCTV & Webcam Hacking☆121Updated 3 weeks ago
- Simple Python IP Tracker☆79Updated 6 years ago
- Using open Adb ports we can exploit a devive☆91Updated 3 years ago
- Mob-Droid helps you to generate metasploit payloads in easy way without typing long commands and save your time.☆84Updated 4 years ago
- Gloom-Framework :: Linux Penetration Testing Framework☆50Updated 7 years ago
- Most Complete Hacking Toolkit☆139Updated 3 weeks ago
- Script to generate Android App that can hijack autenticated sessions in cookies☆173Updated 5 years ago
- An easy tool to generate backdoor with msfvenom (a part from metasploit framework). This tool compiles a malware with popular payload and…☆110Updated 8 years ago
- ☆70Updated last year
- The Social-Engineer Toolkit (SET) automatic installer for Android☆100Updated 5 years ago
- Wi-Fi Automatic Crack☆91Updated 3 weeks ago
- Phishing Tool For Advanced Instagram Copyright Infringement Attack☆81Updated 11 months ago
- Python wordlist generator☆166Updated 2 years ago
- Automated Payload Generator Tool☆101Updated 4 years ago
- The AK47 PROJECT☆78Updated 5 years ago
- Cam-dumper is a written tool in the language of Python program for hacking CCTV cameras that can access cameras in 20 countries☆145Updated 8 months ago
- Samples Phishing tools made for Linux it contains 30 different type of Phishing Pages made with flask☆100Updated 2 years ago
- Lazymux is a huge list of Many Hacking tools and PEN-TESTING tools! NOTE: Am not Responsible of bad use of this project.☆138Updated 4 years ago
- Remote Administration Tool For OS Linux☆51Updated 5 years ago
- Toolkit Hacking☆63Updated last year
- Prank your friends with Call and SMS☆63Updated 3 years ago
- Shellphish is created by TheLinuxChoice but after the repository deleted we recreate this. To know how to use shellphish visit our websit…☆85Updated 4 years ago
- Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standa…☆64Updated 5 years ago
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆97Updated 2 years ago
- PhishX - The Complete Spear Phishing Tool☆91Updated 6 years ago
- Undetectable helps you to generate fully undetectable payload of metasploit which can bypass android antivirus.☆110Updated last year
- Social Media Hacking & Information Tool☆146Updated 3 years ago