antkowiak / ScamBaitingLinks
Tools for baiting phone-tech-support-scammers
☆22Updated 5 years ago
Alternatives and similar repositories for ScamBaiting
Users that are interested in ScamBaiting are comparing it to the libraries listed below
Sorting:
- A compilation of scambaiting resources☆22Updated 3 years ago
- A repository of Tor hidden services.☆65Updated 4 years ago
- C# .Net Framework scambait toolkit. Replacements for standard Windows programs with a little extra added ;)☆35Updated last year
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆10Updated 6 years ago
- Create Containerized Clearnet Proxies☆31Updated 6 years ago
- Bait bank created for scambaiting☆31Updated 5 years ago
- Doxing Templates | Search for and publish private or identifying information about (a particular individual) on the Internet, typically w…☆41Updated 7 years ago
- 🔍sᴏᴄɪᴀʟ ᴍᴇᴅɪᴀ ʟᴏᴏᴋᴜᴘ🔍☆25Updated 3 years ago
- Scan the entire internet for SSH and Telnet services. Then hack them.☆79Updated 3 years ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆62Updated 3 weeks ago
- Active reconaissance, information gathering and OSINT built in a portable web application test.☆84Updated 5 months ago
- Disposable Mails From Command Line☆33Updated 5 years ago
- OSINT webcam mapping project☆87Updated 7 years ago
- This project is a continuation of the Moriarty project. But this osint website, has more feautres than Moriarty has☆34Updated 4 years ago
- Simple Penetration Testing Multitool For Beginners.☆58Updated 3 years ago
- python reverse shell with gmail☆17Updated last year
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆46Updated 3 years ago
- WiFi-Jammer/DoS toolset☆61Updated 5 years ago
- this is the fastest way that you can get admin rights at work,school,etc in only a few seconds☆90Updated 4 years ago
- PYTHON CODE TO SEARCH BY DORK ON (.onion) WEBSITES , NORMAL WEBSITES AND LEARN HOW DORK WORK.☆60Updated last year
- A Python Module designed to find and brute force Zoom Meeting ID's and their passcode.☆28Updated 4 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆20Updated 7 years ago
- Distributing WPA hash cracking.☆22Updated 3 years ago
- Remote Access Tool, Command & Control, based on the github project Ares, but written in python 3 with some extra features.☆38Updated 4 years ago
- FTP server crawler for anonymous login based on shodan☆36Updated 5 years ago
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆78Updated 2 years ago
- Users parser for Fetlife website.☆13Updated 2 years ago
- Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showe…☆43Updated 5 years ago
- This informative guide offers essential tips to avoid legal trouble with law enforcement by educating readers on their rights and ways to…☆26Updated last month
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆45Updated 6 years ago