☆23Mar 27, 2019Updated 7 years ago
Alternatives and similar repositories for Tools-PRIV8-Phreaking-
Users that are interested in Tools-PRIV8-Phreaking- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Mar 21, 2019Updated 7 years ago
- Untuk mencari subdomain dari sebuah host, Gretonger wajib pake☆12Apr 6, 2020Updated 5 years ago
- Simple script for web directory scanning☆33May 22, 2023Updated 2 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆31Sep 30, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Hunt and Analyze Tor Onion Sites☆24Dec 8, 2022Updated 3 years ago
- Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)☆65Dec 16, 2020Updated 5 years ago
- Welcome to OSCP!!!☆14Jan 30, 2020Updated 6 years ago
- Vulnerable Bank Web Application for Cyber Security Course☆13Dec 11, 2022Updated 3 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 4 months ago
- ☆195Feb 13, 2026Updated last month
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- RAS(RAndom Subdomain) Fuzzer☆42Jan 22, 2020Updated 6 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- You can get cc from hear coded by cyber kallan☆19Nov 7, 2019Updated 6 years ago
- Tutorial Lengkap Cara internet Gratis Kartu Telkomsel Dengan termux opok tanpa pulsa dan kouta☆34Jul 31, 2021Updated 4 years ago
- Phoenix based exploit kit for educational purpose.☆17Dec 2, 2018Updated 7 years ago
- ☆21Oct 3, 2019Updated 6 years ago
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- ☆21Dec 1, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- An example implementation of a node-locked license activation flow using Keygen and Python☆26Nov 21, 2023Updated 2 years ago
- Find alive hosts by scanning IP addresses☆12Jun 18, 2020Updated 5 years ago
- ☆18Aug 5, 2022Updated 3 years ago
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆24Aug 14, 2023Updated 2 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- An Android app that intercepts Medium articles, and opens them internally if they're premium.☆26Oct 26, 2019Updated 6 years ago
- Um pequeno programa para saber o IP de diversos sites, alem de localizar a maioria dos IPs☆10Oct 25, 2019Updated 6 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Mar 10, 2023Updated 3 years ago
- MMO RPG☆12Sep 2, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Kaumodaki is a tool which has collection of all the popular hacking tools at one place.☆25May 17, 2020Updated 5 years ago
- CVE & others☆19Aug 14, 2018Updated 7 years ago
- A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your we…☆35Jan 12, 2026Updated 2 months ago
- ☆10Aug 18, 2022Updated 3 years ago
- Metasploit Framework☆10Apr 3, 2017Updated 8 years ago
- A proof-of-concept Node.js ransomware☆21Mar 27, 2022Updated 4 years ago
- scan a range of IP with a user input the start and the end of the IP range with a port to scan if open☆15Dec 13, 2019Updated 6 years ago