antkowiak / ScamBaitingLinks
Tools for baiting phone-tech-support-scammers
☆23Updated 5 years ago
Alternatives and similar repositories for ScamBaiting
Users that are interested in ScamBaiting are comparing it to the libraries listed below
Sorting:
- A compilation of scambaiting resources☆23Updated 3 years ago
- C# .Net Framework scambait toolkit. Replacements for standard Windows programs with a little extra added ;)☆35Updated last year
- WiFi-Jammer/DoS toolset☆62Updated 5 years ago
- Users parser for Fetlife website.☆13Updated 2 years ago
- Get your USB Rubber Ducky up and running faster☆44Updated 7 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆19Updated 7 years ago
- A repository of Tor hidden services.☆65Updated 3 years ago
- This project is a continuation of the Moriarty project. But this osint website, has more feautres than Moriarty has☆33Updated 4 years ago
- Social Scraper is a python tool meant for Detection of Child Predators/Cyber Harassers on Social Media☆60Updated 4 years ago
- Refluxion -- MITM WPA attacks tool☆38Updated 5 years ago
- Disposable Mails From Command Line☆32Updated 5 years ago
- Python script that will extract all saved passwords from your google chrome database on windows only☆77Updated 4 years ago
- 🐒 Browser extension for wasting scammers' time and patience.☆13Updated 4 years ago
- Bait bank created for scambaiting☆28Updated 5 years ago
- Fully functional Windows UAC bypass for Hak5 USB rubber ducky.☆27Updated 10 years ago
- Python program that denies internet access to a target within a local network...☆24Updated 4 years ago
- 🔍sᴏᴄɪᴀʟ ᴍᴇᴅɪᴀ ʟᴏᴏᴋᴜᴘ🔍☆25Updated 3 years ago
- Are.We.Secure.Yet Framework aims to test the wifi security of a location, attempting to locate individual devices☆40Updated 2 years ago
- Find data about you or an individual from various online public records☆31Updated 8 years ago
- Doxing Templates | Search for and publish private or identifying information about (a particular individual) on the Internet, typically w…☆42Updated 7 years ago
- Handshake cracker☆52Updated 2 years ago
- Official Black Hat Arsenal Security Tools Repository☆13Updated 7 years ago
- Generate multiple combinaisons of passwords from key names.☆24Updated 5 years ago
- It'll grab the IP sitting behind Cloudflare ¯\_(ツ)_/¯☆20Updated 8 years ago
- Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showe…☆43Updated 5 years ago
- OSINT webcam mapping project☆85Updated 7 years ago
- FTP server crawler for anonymous login based on shodan☆36Updated 5 years ago
- the best and small passwords lists to crack handshake wpa-wpa2☆76Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆56Updated 7 years ago
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆79Updated 2 years ago