cryptolok / GhostInTheChaos
Chaotic Crypto Stealth VPN for Anonymity and Untraceable Hacking Attacks with Linux and Android
☆96Updated 4 years ago
Related projects: ⓘ
- A Metasploit payload that will connect to the victim and open up a permanent backdoor to their phone.☆48Updated 8 years ago
- ☆20Updated this week
- ☆38Updated this week
- Most advanced framework yet! From spoofing to cryptography, Trity has it all!☆41Updated 7 years ago
- ☆28Updated 7 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆47Updated 6 years ago
- ☆36Updated this week
- ☆53Updated this week
- ☆53Updated this week
- Collection of white, grey and blackHat tools - for use playing around. setting up and operating pentesting linux builds - Primarily Kali-…☆18Updated 6 years ago
- Gloom-Framework :: Linux Penetration Testing Framework☆49Updated 6 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆43Updated last year
- M-dork, google dorking with mdork☆54Updated 5 years ago
- EvilDroid+TheFatRat☆12Updated 5 years ago
- WIP - Chromium plugin for PhoneInfoga's Google Search scanner☆73Updated 3 years ago
- SMS Phishing Tools☆77Updated 7 years ago
- SMS Spoofer for Social Engineering/Pentest Engagements☆43Updated 7 years ago
- ☆22Updated this week
- ☆33Updated this week
- sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking o…☆25Updated 6 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆52Updated 3 years ago
- ☆67Updated this week
- Tools-kit For Metasploit☆36Updated 4 years ago
- Wireless Security Testing v1.0☆11Updated 6 years ago
- ☆64Updated 2 years ago
- Clone a voice in 5 seconds to generate arbitrary speech in real-time☆18Updated 4 years ago
- ☆27Updated this week
- ☆34Updated this week
- ☆16Updated this week
- RouterBrute can Bruteforce/Dictionary attack the login for the Router's Login page☆15Updated 7 years ago