BLE cha0s t00lkit xox
☆91Dec 20, 2025Updated 3 months ago
Alternatives and similar repositories for Spam-Jam
Users that are interested in Spam-Jam are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WiFi Cha0s t00lkit w/ multi payload options☆84Mar 4, 2026Updated last month
- PDFs of awesome cybersecurity info☆27Jan 19, 2026Updated 2 months ago
- Advanced phishing investigation and disruption toolkit☆65Feb 16, 2026Updated last month
- QR code Ghostmode☆27Jul 30, 2025Updated 8 months ago
- ☆13Apr 25, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- rogue botnet w/ advanced c2 and extensive payload repo (RAT)☆48Mar 12, 2026Updated last month
- Researching vulnerabilities with iOS Shortcuts.☆15Apr 15, 2025Updated last year
- Description: The Windows Recon Toolkit is an advanced, automated reconnaissance payload designed for use with USB Rubber Ducky or compati…☆16Feb 23, 2026Updated last month
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆20Jul 16, 2024Updated last year
- whisperPAIR poc☆37Feb 4, 2026Updated 2 months ago
- Ethical hacking toolkit for iOS devices using iSH Shell.☆200Nov 26, 2025Updated 4 months ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Mar 31, 2023Updated 3 years ago
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆31Jul 17, 2024Updated last year
- HID payloads for good purpose☆10Dec 17, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- reverse engineering random malwares☆23Mar 12, 2026Updated last month
- A CRT pixelation effect for backgrounds and decyphering animation.☆10Oct 9, 2025Updated 6 months ago
- A portable bridge between your C2 infrastructure and Discord, built for quick and lightweight operations.☆12Jun 3, 2025Updated 10 months ago
- V2.5 of Eustathios Spider (Includes Many Community Mods)☆12Feb 27, 2023Updated 3 years ago
- NetVuln 2.0 - As the Predeccessor to NetVuln 1.0 - This Newer program will not only be able to perform a port scan and subdomain scan b…☆21Aug 11, 2025Updated 8 months ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Sep 18, 2020Updated 5 years ago
- track, trace, and take down with SCAMTRACK☆40Feb 26, 2026Updated last month
- ☆48Oct 1, 2025Updated 6 months ago
- the first BlankOBFv2 deobfuscator made in python☆10Jun 19, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- App to sync pocket operator devices☆14Feb 8, 2023Updated 3 years ago
- This repository contains a guide to completing the Bandit levels in the OverTheWire wargames.☆16May 7, 2019Updated 6 years ago
- Bluetooth rubberducky, Keyboard & Mouse Emulator for Kali NetHunter and NetHunter Pro☆15Nov 30, 2025Updated 4 months ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- A python script to check printer across the world that allow printing on port 9100 trough pjl☆16Dec 27, 2024Updated last year
- A free and open source minimalist RSS feed reader. Private, no algorithm, no ads, so you control your data.☆23Jul 30, 2025Updated 8 months ago
- Hacking-Tool for logging, testing and replaying data of devices with Wiegand Interface☆22Mar 23, 2026Updated 3 weeks ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- 🔮 Uncover parts of mutuals followers of an instagram private account☆17Mar 31, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- https://gitlab.com/kalilinux/nethunter/build-scripts/kali-nethunter-project☆13Nov 30, 2020Updated 5 years ago
- XSS that opens Blobbypass. It can be useful for webview bypasses.☆11Jun 5, 2025Updated 10 months ago
- An install helper program for items served via OpenCollaborationServices (ocs://)☆15Jun 23, 2017Updated 8 years ago
- Clevo BIOS fully unlocked/modded collection by dsanke☆19Feb 19, 2026Updated last month
- Modified source code for "Mega Man X Online: Deathmatch" fan game.☆10Mar 25, 2026Updated 2 weeks ago
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆15Sep 29, 2020Updated 5 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆22Sep 30, 2025Updated 6 months ago