ekomsSavior / SCAMTRACKLinks
track, trace, and take down with SCAMTRACK
☆29Updated 3 months ago
Alternatives and similar repositories for SCAMTRACK
Users that are interested in SCAMTRACK are comparing it to the libraries listed below
Sorting:
- Drana-Infinity is a locally hosted advanced AI assistant designed and developed by IHA089. It’s built specifically for cybersecurity, eth…☆107Updated this week
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆176Updated last year
- WiFi Cha0s t00lkit xox☆69Updated 4 months ago
- PDFs of awesome cybersecurity info☆22Updated 3 weeks ago
- reverse shell, Bypass windows defender firewall☆45Updated last year
- Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.☆104Updated 2 years ago
- Pentesting Suite☆51Updated 5 months ago
- All my ducky script for my malduino☆25Updated 4 years ago
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆104Updated last year
- BLE cha0s t00lkit xox☆61Updated 2 months ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆99Updated last month
- Turning smart lights into Wifi Hacking implants.☆161Updated 10 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆99Updated 2 years ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆73Updated 8 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆64Updated last year
- This project is a server-side solution for seamless URL redirection when a QR code is scanned. It redirects users to a specified URL and …☆17Updated 3 months ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆38Updated last year
- Autofill Phishing☆84Updated 3 months ago
- Here are +200 different rats some with source code☆128Updated 2 years ago
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆34Updated 3 weeks ago
- Advanced phishing investigation and disruption toolkit written in Python xo☆53Updated last week
- Redirect All Traffic Through Tor Network For Kali Linux☆207Updated 8 months ago
- rogue botnet☆21Updated 5 months ago
- DarkGPT Lite is a specialized CLI tool providing unrestricted conversations with AI for cybersecurity research purposes☆42Updated 7 months ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆123Updated last month
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. …☆51Updated last year
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆43Updated 7 months ago
- capNcook - a dark web exploration tool☆84Updated last year
- SilverInstaEye is a comprehensive OSINT tool for Instagram. It gathers extensive information about the target user.☆240Updated 7 months ago