cSploit traffic manipulator
☆32Aug 3, 2017Updated 8 years ago
Alternatives and similar repositories for evilproxy
Users that are interested in evilproxy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- the core of the cSploit project☆35Feb 2, 2018Updated 8 years ago
- cSploit network radar☆33Apr 10, 2016Updated 10 years ago
- A repository for holding Kali specific assets for UserLAnd☆25Apr 25, 2025Updated last year
- Android terminal emulator and Linux environment - packages repository.☆14Dec 14, 2022Updated 3 years ago
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 4 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Automatically Scans For Default Networks & Guess The Password☆14Dec 9, 2016Updated 9 years ago
- *nix tools and package management for Android☆89Apr 9, 2012Updated 14 years ago
- All-in-One WebSploit Installer for Android Devices (Termux) Created by @Voldemort1912☆12Feb 20, 2019Updated 7 years ago
- website for cSploit organization☆64May 5, 2020Updated 5 years ago
- Metasploit Framework for android☆46Sep 22, 2015Updated 10 years ago
- The Ruby Programming Language☆12Nov 29, 2015Updated 10 years ago
- A repository with scripts for the dSploitScripts Android app. For use with dSploit script injection.☆53Mar 8, 2021Updated 5 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- Network Security Monitoring Console☆22Feb 3, 2010Updated 16 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Clone an Android Virtual Device for easy distribution through the Android SDK Manager.☆16Jul 9, 2012Updated 13 years ago
- WiFi hacking with aircrack-ng support scripts☆11Oct 4, 2017Updated 8 years ago
- Read Magnetic stripe data using square card reader☆13Jul 12, 2013Updated 12 years ago
- p7zip with hfs symlink support☆10Jul 18, 2015Updated 10 years ago
- Universal HTC RUU/ROM Decryption Tool☆18Jun 1, 2016Updated 9 years ago
- Simple background job/task processing queue for Node.js (>= 7.6) using `cluster` & separate Node processes.☆16Dec 6, 2022Updated 3 years ago
- Scripts and other stuff for Termux, a Linux environment for Android☆11Dec 16, 2017Updated 8 years ago
- The official web client for the cSploit daemon☆13Sep 2, 2017Updated 8 years ago
- Simple Chrome Extension to Add Check Marks in Gmail ✓✓☆11May 3, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The droidsec web site!☆171Sep 19, 2024Updated last year
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 7 years ago
- ☆20Jul 29, 2016Updated 9 years ago
- ☆14Dec 28, 2020Updated 5 years ago
- Aggressive Mass AP Deauth/Jammer (PWN ALL WIFI IN RANGE)☆14May 26, 2023Updated 2 years ago
- allows for magnetic card swipe data input using the square card reader plugged into the headphone port of your laptop or tablet☆17Jun 21, 2014Updated 11 years ago
- Localhost Server With Termux☆42Apr 9, 2026Updated 2 weeks ago
- A GitHub App built with Probot that opens issues and pull requests in Gitpod.☆20Feb 12, 2019Updated 7 years ago
- Literally does the opposite of Ciphey. Encrypts text.☆11Feb 25, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Small helper program for monitor layouts.☆10Nov 9, 2016Updated 9 years ago
- A research done by Yaara Shriki and Roman Zaikin on Google maps April Fool Prank.☆15Oct 21, 2019Updated 6 years ago
- Docker image containing tor with auto ip rotate and possibility to select your exit region☆14Jan 6, 2019Updated 7 years ago
- Web interface for recon-ng☆14Nov 22, 2015Updated 10 years ago
- A set of vulnerable machines rendered by Packer and Ansible scripts.☆13Feb 15, 2021Updated 5 years ago
- package for facebook predection password☆15May 18, 2016Updated 9 years ago
- A python script file to decrypt encrypted IEE (802.11) Radio .pcap files captured via Wireshark for extraction and analyse.☆10Sep 8, 2019Updated 6 years ago