anovni / darkaiLinks
+300 TOOLS in 1! IN ITALIANO
☆13Updated 2 years ago
Alternatives and similar repositories for darkai
Users that are interested in darkai are comparing it to the libraries listed below
Sorting:
- Deface HTML Page Generator☆105Updated 2 months ago
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆53Updated last year
- Hackerinfo infromations Web Application Security☆72Updated 2 years ago
- DragonMS is Tools for ddos, scanner, tracker, payload generator msfvenom and scraping☆79Updated 3 years ago
- ⛤Keylogger Generator for Windows written in Python⛤☆54Updated 2 years ago
- Simple script masks the phishing link under the normal URL☆84Updated 4 years ago
- Phising 2FA Gmail☆101Updated 3 years ago
- Rogue access point tool.☆60Updated 3 years ago
- This is a simple python tool to automatically deface webdav vulnerable websites.☆162Updated 8 months ago
- Best social media phishing☆23Updated 5 years ago
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆144Updated 2 months ago
- Cracking protocols FTP and SSH.☆11Updated last year
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆42Updated 3 years ago
- This is a website penetration testing tool for testing webdav server vulnerabilities.☆40Updated 8 months ago
- This tool will create a .exe file which will send you all the information of victim once the file executes!☆37Updated 8 months ago
- 📦 Wireless Attacks Tools 🕷️☆73Updated last year
- Phishing mobile application made in React Native for both Android and iOS devices.☆34Updated 3 years ago
- A python based tool for finding SQL vulnerable sites.☆14Updated 2 years ago
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆75Updated 2 years ago
- LulzDDOS TOOL- powerful DDoS toolkit for penetration tests☆30Updated 2 years ago
- BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack☆48Updated 6 years ago
- Advanced phishing tool used for session & credential grabbing and bypassing 2FA using man-in-the-middle attack with standalone reverse p…☆89Updated 2 years ago
- Dogma V1.5.3☆31Updated 5 years ago
- A versatile command and control center (CCC) for DDoS Botnet Simulation & Load Generation.☆125Updated last year
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆106Updated 3 years ago
- PhishX - The Complete Spear Phishing Tool☆111Updated 6 years ago
- Automated Payload Generator Tool☆106Updated 4 years ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆87Updated 9 months ago
- Bruteforce tool / cracker for MD5 hashes. Processing single hashes, lists and combolists (userid:md5hash).☆35Updated 4 years ago
- Automated Wireless Attack Framework☆75Updated 6 years ago