antkowiak / ScamBaitingLinks
Tools for baiting phone-tech-support-scammers
☆23Updated 5 years ago
Alternatives and similar repositories for ScamBaiting
Users that are interested in ScamBaiting are comparing it to the libraries listed below
Sorting:
- A compilation of scambaiting resources☆22Updated 3 years ago
- C# .Net Framework scambait toolkit. Replacements for standard Windows programs with a little extra added ;)☆35Updated last year
- My tools for scambaiting.☆24Updated 3 years ago
- A repository of Tor hidden services.☆65Updated 4 years ago
- 🔍sᴏᴄɪᴀʟ ᴍᴇᴅɪᴀ ʟᴏᴏᴋᴜᴘ🔍☆25Updated 4 years ago
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆77Updated 3 years ago
- Fsociety Hacking Tools Pack – A Penetration Testing Framework; A Penetration Testing Framework, you will have every script that a hacker …☆48Updated 8 years ago
- Bait bank created for scambaiting☆31Updated 5 years ago
- A script to build either Blackarch, Kali linux or ParrotOS Docker container which has the ability to provide desktop environment access e…☆40Updated 4 years ago
- Find data about you or an individual from various online public records☆30Updated 8 years ago
- (Network Metadata Privacy) MAC Address spoofer with bonus combo (options): hostname + signal spoofer - *no disconnects!* Privacy Changing…☆54Updated 2 years ago
- WiFi-Jammer/DoS toolset☆61Updated 5 years ago
- Create Containerized Clearnet Proxies☆31Updated 6 years ago
- This project is a continuation of the Moriarty project. But this osint website, has more feautres than Moriarty has☆34Updated 4 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Updated 3 years ago
- Disposable Mails From Command Line☆33Updated 5 years ago
- This repository was created to put into practice the knowledge acquired in hacking courses at Escola de Hackers with master and mentor Ma…☆19Updated last year
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆59Updated 8 years ago
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Updated 6 years ago
- Facebook phishing page☆10Updated 5 years ago
- This is a simple tool for openbullet configs☆23Updated 4 years ago
- Scan the entire internet for SSH and Telnet services. Then hack them.☆79Updated 3 years ago
- Are.We.Secure.Yet Framework aims to test the wifi security of a location, attempting to locate individual devices☆41Updated 2 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆48Updated 3 years ago
- Code, data, and (possibly) schematics for recording wireless network data around a city☆12Updated 12 years ago
- A set of scripts to list tor hidden services☆181Updated 3 months ago
- Active reconaissance, information gathering and OSINT built in a portable web application test.☆84Updated 6 months ago
- Convert DuckyScript (USB Rubber Ducky) to Python Applications☆136Updated last year
- GhostNET script that will help you be safer on the cyber☆64Updated 4 years ago
- It'll grab the IP sitting behind Cloudflare ¯\_(ツ)_/¯☆19Updated 8 years ago