drcrypterdotru / Zeus-GrabberLinks
Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H
☆55Updated 3 months ago
Alternatives and similar repositories for Zeus-Grabber
Users that are interested in Zeus-Grabber are comparing it to the libraries listed below
Sorting:
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆55Updated last year
- PhantomCrawler is a Python-based web testing and research tool that simulates website interactions from multiple proxy IP addresses to an…☆74Updated 2 weeks ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆99Updated 2 years ago
- This is power full BotNet☆40Updated 2 years ago
- 27 ways to bypass 2FA/otp☆51Updated 2 years ago
- SMTP Heist (SMTP Cracker) - Advanced Built with PyQt6 UI - Report to Telegram☆36Updated 3 months ago
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆43Updated last year
- Layer 7 DDoS Panel with Cloudflare Bypass ( UAM, CAPTCHA, BFM, etc.. )☆24Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated 2 years ago
- A simple script to obfuscate batch(bat) code easily☆25Updated 2 years ago
- Perfect scripts for all the hustle we have with mass-mailing☆123Updated 4 months ago
- Hacking with PasteJacking technique☆22Updated last year
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆91Updated 8 months ago
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆79Updated last year
- PassBreaker☆65Updated last year
- Website Phishing Source Code☆33Updated 3 years ago
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Updated last year
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆47Updated 2 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆28Updated 2 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14Updated 2 years ago
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- This is a tool to obfuscate / to make your python code unreadable. It obfuscates your code and prevents easy access of others to your cod…☆42Updated last year
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆24Updated 2 years ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆43Updated 3 months ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆27Updated 4 years ago
- RDP Stealer☆26Updated 4 years ago
- DrXploit is a powerful and open-source penetration testing and exploitation tool for web applications. This tool is designed to automate …☆14Updated 3 months ago