anouarbensaad / cisco-hLinks
This tool is virtual cisco_router to simulate telnet hacker connexion in Python which logs HackerIP and Command Lines
☆19Updated 7 years ago
Alternatives and similar repositories for cisco-h
Users that are interested in cisco-h are comparing it to the libraries listed below
Sorting:
- This tool is for detecting all what NMAP does if someone wants to hack you and expose the scanning from where by IP ADDRESS and the exact…☆39Updated 6 years ago
- This tool to simulate http server attacks in Python which logs HackerIP and all the tracing he does into a Logfile then a database.☆73Updated 6 years ago
- A NodeJS wrapper for the Instagram Bot It works with instagram private api ,It has almost all the features the Instagram app.☆54Updated 3 years ago
- Auxile Framework☆28Updated 5 years ago
- Python util to retrieve full display name and profile picture from a single email address☆102Updated 4 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆35Updated 8 years ago
- Python script that will extract all saved passwords from your google chrome database on windows only☆81Updated 5 years ago
- 🏗 DZGEN - Works with Kali Linux tools☆130Updated 7 years ago
- Basic python script for detect airdroid users in lan☆48Updated 5 years ago
- WP Grab Info v2☆72Updated 7 years ago
- A simple python script to grab twitter account info just by username or profile link☆53Updated 8 years ago
- Social Engineering Tool Oriented to facebook☆58Updated 8 years ago
- InstaBrute | Using For Brute Force Instagram Account☆36Updated 8 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆110Updated 7 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆55Updated last year
- 🚀 Dzjecter V2.0 Server checking Tool☆58Updated 7 years ago
- Random scripts I write to automate non-hacking stuff☆23Updated 6 years ago
- Easy way to brute-force web directory.☆160Updated 6 years ago
- SMS Phishing Tools☆79Updated 8 years ago
- Using Social Engineering To Obtain WiFi Passwords☆101Updated 7 years ago
- Retrieve someones private Facebook location, using their public information.☆57Updated 4 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆74Updated 6 years ago
- SQLi Google Dork Scanner☆59Updated 4 years ago
- Kill Any Antivirus Using Python For Windows Users .☆47Updated 9 years ago
- Gloom-Framework :: Linux Penetration Testing Framework☆52Updated 8 years ago
- A simple python script to scan and attack wireless networks.☆203Updated 8 years ago
- Create Basic SSH Honeypot With Python☆28Updated 9 years ago
- Quasar : An Information Gathering Framework For Lazy Penetration Testers☆162Updated 4 years ago
- Help a buddy prank his colleagues! Show your mettle with spoofing emails, malicious attachments, spoofing sms, and spoofing phone calls t…☆100Updated 9 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Updated 9 years ago