dwisiswant0 / ghostify-crack
A crack 💥 version of Ghostify, that helps you view Instagram stories without a trace (the story owner won't know you saw their story!)
☆7Updated 2 years ago
Alternatives and similar repositories for ghostify-crack:
Users that are interested in ghostify-crack are comparing it to the libraries listed below
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆11Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Web crawler and downloader based on GNU Wget.☆12Updated last year
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Tool to automatically email results from your Python scripts to your inbox as text or as a file attachment, storing the sender email acco…☆8Updated 5 years ago
- WebHook for Red Team☆24Updated 3 years ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 8 months ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆14Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 10 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Updated last year
- Yet another powerful payload encoder/decoder☆14Updated 2 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆31Updated 3 years ago
- A tool to check for response status codes with ease☆14Updated last year
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆34Updated 4 years ago
- ☆9Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Brute force a REST API query through WebSocket. Based on cURL.☆9Updated last year
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali☆9Updated 2 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 3 years ago