cicada-solvers / The-Complete-Cicada3301-Archive
☆30Updated 3 years ago
Alternatives and similar repositories for The-Complete-Cicada3301-Archive:
Users that are interested in The-Complete-Cicada3301-Archive are comparing it to the libraries listed below
- Original files from the puzzles, wiki pages, media coverage, old logs and more.☆20Updated 2 years ago
- Autofill Phishing☆64Updated 3 months ago
- ☆43Updated last year
- This is my private RAT collection, i want to share.☆12Updated 3 months ago
- Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]☆315Updated last year
- Script hecho en bash para realizar un ataque de fuerza bruta a un usuario de un sistema Linux.☆49Updated 10 months ago
- Tool for Wifi Network Attacks☆112Updated 2 months ago
- A tool to automatically redirect all traffic through the TOR and change the IP every 0 to x seconds. And provides a custom MAC address. <…☆65Updated 7 months ago
- Script to redirect all traffic through tor network including dns queries for anonymizing entire system☆179Updated last year
- Herramienta enfocada al Networking, para auditorias o bien para gastar bromas en nuestra Red Wifi o a otras Redes Wifi. [NO ME HAGO RESPO…☆134Updated last year
- Algorithm identification tool on hashes☆22Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆166Updated 9 months ago
- ☆24Updated 4 months ago
- ☆15Updated 3 years ago
- A Simple Discord Command and Control Client for Windows Machines using Powershell☆27Updated 2 months ago
- Turning smart lights into Wifi Hacking implants.☆118Updated last month
- Google account phishing tool written in python using django☆95Updated last week
- ☆28Updated last year
- USB Rubber Ducky Script for capture saved wifi passwords☆75Updated 3 years ago
- Designed to demonstrate how hackers can obtain detailed information about target devices through a simple link, Get-INFO serves as both a…☆22Updated 3 months ago
- A automated monero mining (injector) scripts which mines monero for you in targeted system☆60Updated 8 months ago
- -= Has features =- =============== -DDoS -Web Scanning -Phone Hunter -CCTV Hunter -Deface -Mass Deface -Deface Maker -Bypass Maker -Auto…☆165Updated 3 months ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆57Updated 7 months ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆155Updated 5 months ago
- Keylogger with Gmail, Telegram, and Discord, with different feature in each way of keylogging as screenshots, voice recording, and keystr…☆13Updated last year
- How to set up and install Ss7 and Sigtran Adapt☆14Updated 10 months ago
- LulzSec-Toolkit enables the user to have a menu with the most important tools. But this tool not only allows you to have the most importa…☆29Updated 4 years ago
- GRIM IS A INFORMATION GATHERER AND VULNERABILITY TESTER TOOL, YOU CAN USE IT ON ANY WEBSITE FOR GETTING ITS INFORMATION☆96Updated 3 years ago
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆72Updated last week
- A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.☆61Updated 2 years ago