devluxca / WasaKLinks
WasaK - WhatsHack it's a chat for hackers.
☆11Updated 7 years ago
Alternatives and similar repositories for WasaK
Users that are interested in WasaK are comparing it to the libraries listed below
Sorting:
- Ferramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de re…☆106Updated 7 years ago
- Inject malicious code into *.debs☆276Updated 3 years ago
- Simple Keylogger with smtp to send emails on your account using python works on linux and Windows☆37Updated 5 years ago
- Script feito em PHP que faz consultas de nomes por cpf no banco de dados do Sistema Único de Saúde (SUS)☆38Updated 6 years ago
- This is just a repository of a developer noob.☆17Updated 7 years ago
- Install Kali Linux Tools & Others on your Linux.☆48Updated 5 years ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆439Updated 7 years ago
- Dotfiles for my personal computer!☆17Updated 4 years ago
- Ferramenta de Reconhecimento para Pentest☆48Updated 4 years ago
- A Phishing Dropper designed to Pentest.☆274Updated 8 years ago
- Wordlists based on Brazilian passwords and dictionaries.☆175Updated 9 years ago
- Python Remote Access Trojan☆142Updated 5 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆224Updated 4 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆257Updated 5 years ago
- Hakku Framework penetration testing☆351Updated 4 years ago
- Linux bash script automation for metasploit☆268Updated 6 years ago
- This program focuses on automating the download, installation and compilation of pentest tools from source☆33Updated 7 years ago
- Tor's hammer. Slow post DDOS tool written in python.☆341Updated 3 years ago
- Various codes related to Ransomware Developement☆123Updated 8 years ago
- ☆35Updated 6 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆373Updated 8 years ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆929Updated 6 months ago
- Lock user screen every time the flash drive is unplugged. Creating a two-step authentication on the machine☆16Updated 7 years ago
- ☆115Updated 5 years ago
- Automated victim-customized phishing attacks against Wi-Fi clients☆72Updated 8 years ago
- Multiplatform payload dropper☆275Updated 4 years ago
- tornar utilizavel os digispark's em teclados abnt2☆64Updated 4 years ago
- Generate Gmail Emailing Keyloggers to Windows.☆1,114Updated 2 years ago
- HTTP Server for phishing in Python☆274Updated 2 years ago
- Peça lanches facilmente para lanchonetes pelo WhatsApp com essa ferramenta☆40Updated 4 years ago