SMS flooding tool
☆23May 3, 2025Updated 10 months ago
Alternatives and similar repositories for HELLFIRE
Users that are interested in HELLFIRE are comparing it to the libraries listed below
Sorting:
- DoS Attacks on Bluetooth Devices for pentest purposes☆32Nov 22, 2025Updated 3 months ago
- ☆20Aug 6, 2025Updated 7 months ago
- Advanced phishing investigation and disruption toolkit☆60Feb 16, 2026Updated 2 weeks ago
- A NIGHT miner for the Midnight Scavenger Hunt☆40Jan 19, 2026Updated last month
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 5 months ago
- ☆28Oct 3, 2025Updated 5 months ago
- My Personal☆11Updated this week
- Wahoo KICKR Indoor Bike Bluetooth Projects☆13Feb 23, 2024Updated 2 years ago
- Find the zone of the mobile number using the suffix code☆14Aug 17, 2022Updated 3 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- a collection of wordlist for different projects☆12Oct 12, 2024Updated last year
- ☆11Apr 20, 2023Updated 2 years ago
- Personal Library Manager☆45Updated this week
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated last year
- facebook bruteforce tool☆10Dec 3, 2023Updated 2 years ago
- I want to say please and thank you to Claude, but I don't want to waste tokens on it.☆27Feb 18, 2026Updated 2 weeks ago
- WiFisploit is a tool designed to scan and attack Wi-Fi networks using variety of powerful and effective attacks. It contains numerous com…☆43Jun 16, 2025Updated 8 months ago
- Same @Mebus/cupp tool but best speed and Creates every possible word using the information you provide.☆20Nov 30, 2025Updated 3 months ago
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆13May 25, 2025Updated 9 months ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- The main purpose is to generate custom wordlists based on user-provided info (name, surname, nickname, team, date of birth, etc.). The to…☆33Aug 19, 2025Updated 6 months ago
- A tool that automates fileless SSH backdoor injection—bypassing CA checks, erasing logs, creating long‑lived (up to 9999 days) passwordle…☆28Jan 30, 2026Updated last month
- WiFi Hacking Suite☆34Feb 9, 2026Updated 3 weeks ago
- I made a theme for Better Discord. Here it is.☆13Feb 11, 2025Updated last year
- Flipper RPC protobuf specification with screen color parameters and keyboard input request☆13Jan 11, 2025Updated last year
- ☆12Apr 25, 2025Updated 10 months ago
- ☆10Sep 13, 2024Updated last year
- ☆18Feb 19, 2025Updated last year
- My BashBunny scripts☆19Feb 15, 2018Updated 8 years ago
- Search information across a youtube Channel☆15Dec 10, 2024Updated last year
- poc for CVE-2025-24252 & CVE-2025-24132☆154Jan 8, 2026Updated last month
- WiFi Cha0s t00lkit☆77Feb 22, 2026Updated last week
- DIY: Ultimate AI Powered Autoblog (Python, Ollama, Beautiful Soup, Feedparser, SQLite)☆13Apr 14, 2024Updated last year
- Get ready for the World Wide WarDrive, or your next big stumbling adventure!☆15Jul 11, 2024Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated last year
- Compilation of commands for hacking tasks and security tools as a bit of everything☆14Jul 3, 2025Updated 8 months ago
- A Trading bot designed to trade top gaining or top losing assets based on CoinGecko API. Uses python and the Binance API to place orders.☆15Jan 20, 2025Updated last year
- ☆24Nov 13, 2025Updated 3 months ago
- A C# Wrapper allowing to use the functions of the logitech LCD SDK in .NET☆15Feb 17, 2020Updated 6 years ago