Script para crackear cuentas de Facebook usando la ID del usuario
☆53May 7, 2024Updated last year
Alternatives and similar repositories for b4r-brute
Users that are interested in b4r-brute are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SImple script, que nos permite suplantar cualquier correo electronico☆27Aug 2, 2020Updated 5 years ago
- Script basico para extraer datos de una ip☆24Jul 20, 2020Updated 5 years ago
- Creacion de una web falsa para obtener datos de tarjetas de credito☆13Aug 11, 2020Updated 5 years ago
- Ataque denegacion de servicio☆11Sep 28, 2020Updated 5 years ago
- Herramienta para banear cuentas de instagram automatica☆20May 4, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- PhoneFy un simple script para obtener informacion de un telefono☆11Nov 5, 2021Updated 4 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- This course provides a practical introduction to Linux reverse engineering and exploitation. You’ll learn how Linux binaries work under t…☆24Oct 3, 2025Updated 5 months ago
- InfoG ~ Information Gathering Tools☆22Aug 1, 2018Updated 7 years ago
- SpamCall unlimited☆27Apr 8, 2021Updated 4 years ago
- ☆10Jul 27, 2022Updated 3 years ago
- ☆20Jan 19, 2021Updated 5 years ago
- SpamCall unlimited☆25Mar 17, 2020Updated 6 years ago
- Uscrapper 2.0, a powerful OSINT webscraper for personal data collection. Uscrapper uses web scraping to extract email IDs, social-media l…☆17Feb 10, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Simple Herramienta para obtener fotografías del dispositivo que reciba el enlace.☆19May 21, 2021Updated 4 years ago
- ☆236Sep 22, 2022Updated 3 years ago
- ☆44Apr 27, 2024Updated last year
- ☆23Mar 28, 2021Updated 5 years ago
- Runpe + DInvoke + Syscall☆16Jun 18, 2021Updated 4 years ago
- Best social media phishing☆25May 24, 2020Updated 5 years ago
- Python Script for Email Bombing which supports Gmail, Yahoo, Hotmail/Outlook☆27Sep 30, 2020Updated 5 years ago
- ☆12Feb 15, 2026Updated last month
- Instalación Correcta de Ngrok en Termux.☆121Feb 12, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Bypass Windows defender syscall☆18Jul 17, 2021Updated 4 years ago
- ☆18Aug 17, 2022Updated 3 years ago
- A fun way to express your feelings if you are a programmer☆10Oct 25, 2022Updated 3 years ago
- Clone of instashell from thelinuxchoice☆209May 22, 2024Updated last year
- Classical Pong game written in BootSector (512byte) nasm intel 8086 assembly☆11Jul 12, 2024Updated last year
- Hack front Camera on an android phone☆148Nov 14, 2023Updated 2 years ago
- ☆16Jan 14, 2022Updated 4 years ago
- ☆101Jan 15, 2022Updated 4 years ago
- ☆55Sep 22, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆13Jun 27, 2020Updated 5 years ago
- Sencillo script que nos permite eliminar automáticamente todos los archivos duplicados de dos carpetas diferentes.☆12Apr 20, 2022Updated 3 years ago
- XSSRecon - Reflected XSS Scanner☆27Oct 7, 2020Updated 5 years ago
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆35Nov 7, 2025Updated 4 months ago
- Automated Phishing Tool☆11Aug 25, 2020Updated 5 years ago
- A collection of crypters, binders, mailers etc for M$ Windows☆24Apr 27, 2018Updated 7 years ago
- Reverse shell hecho en Java, donde tendremos el código correspondiente para la máquina cliente (atacante) y para el servidor (víctima)☆12Mar 13, 2024Updated 2 years ago