duke1102 / ScambaitingDeluxeLinks
Various tools to aid with scambaiting
☆12Updated 7 years ago
Alternatives and similar repositories for ScambaitingDeluxe
Users that are interested in ScambaitingDeluxe are comparing it to the libraries listed below
Sorting:
- C# .Net Framework scambait toolkit. Replacements for standard Windows programs with a little extra added ;)☆35Updated last year
- My tools for scambaiting.☆24Updated 3 years ago
- A compilation of scambaiting resources☆22Updated 3 years ago
- A repository of Tor hidden services.☆65Updated 4 years ago
- [BASH] Password generator through a wordlist☆12Updated 12 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 8 years ago
- ☆23Updated 6 years ago
- Tools for baiting phone-tech-support-scammers☆23Updated 5 years ago
- ☆17Updated 3 years ago
- Metasploit/MSFVenom Payload Generator Stand Alone☆30Updated 8 years ago
- Archive of leaked Equation Group materials☆16Updated 9 years ago
- pen testing scripts☆12Updated 4 years ago
- It'll grab the IP sitting behind Cloudflare ¯\_(ツ)_/¯☆19Updated 8 years ago
- A lightweight ducky script generator written in python.☆36Updated 4 years ago
- Full malware Kit☆57Updated 4 years ago
- Fully functional Windows UAC bypass for Hak5 USB rubber ducky.☆29Updated 10 years ago
- Code, data, and (possibly) schematics for recording wireless network data around a city☆12Updated 12 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆28Updated 8 years ago
- AES Ransomware in batch☆11Updated last year
- Windows Auto Post Exploitation - For ReD Team☆15Updated 6 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Updated last year
- Bait bank created for scambaiting☆31Updated 5 years ago
- Create Containerized Clearnet Proxies☆31Updated 6 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Updated 3 years ago
- Custom Maltego transforms☆67Updated 10 years ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 6 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 9 years ago
- Wordlist generated using leaked databases, Pipal, and CUPP.☆35Updated 7 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Updated 3 years ago
- Scan the entire internet for SSH and Telnet services. Then hack them.☆79Updated 3 years ago