ITS POWER FULL HACKING TOOL
☆12Jan 12, 2024Updated 2 years ago
Alternatives and similar repositories for TermuxScreenLocking
Users that are interested in TermuxScreenLocking are comparing it to the libraries listed below
Sorting:
- WhatsSpy Public - Spy Tool Whatsapp☆10Aug 23, 2015Updated 10 years ago
- Hack anyone snapchat Account by Phone and gmail☆10Oct 18, 2022Updated 3 years ago
- <br> Step 1 - Install Termux App on your Android smartphone .<br> <br> <br> Step 2 - type commands as shown below :-<br> <br> <br> <br> …☆46Jan 9, 2021Updated 5 years ago
- Music downloader for Tidal☆10Apr 12, 2016Updated 9 years ago
- This sample shows how to uninstall and hide apps programmatically☆12Dec 4, 2019Updated 6 years ago
- Exploit for LG Q710ULM (Stylo 4 AMZ variant) for writing arbitrary contents to eMMC and patching aboot via S-EL3 warmboot takeover☆14Jan 4, 2021Updated 5 years ago
- 🤖 Intelligent AI-powered PCB design automation tool using machine learning for component placement, routing optimization, and signal int…☆30Aug 15, 2025Updated 6 months ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- privilege escalation by piggy-backing user sudo requests☆11Feb 6, 2023Updated 3 years ago
- Steps To Install ZPhisher on Termux Without Error First, open your termux and active your internet connection and then start using the be…☆31Oct 19, 2021Updated 4 years ago
- Alfred is a advanced OSINT information gathering tool☆11Nov 14, 2025Updated 3 months ago
- Minigotchi ported to multiple ESP32 devices. (Main Repo (Archived) by @dj1ch)☆14Aug 24, 2025Updated 6 months ago
- Safari tabs for iPhone on iOS 14.x☆12May 7, 2021Updated 4 years ago
- This repository is all about text files containing the way /steps to penetrate a system . it includes network pentesting ,web pentesting …☆15Feb 17, 2023Updated 3 years ago
- Hack accounts such as facebook, Instagram, Twitter☆13Dec 8, 2020Updated 5 years ago
- Tecnicas de escaneo con Nmap☆15Jul 21, 2023Updated 2 years ago
- SecuritySpy - Messages.app and iMessage Integration☆13Nov 5, 2019Updated 6 years ago
- TQT-C6 is a mini development board based on the ESP32C6 chip, which is only the size of two thumbnails. It features a 128x128px TFT full-…☆14Sep 18, 2025Updated 5 months ago
- ☆13Apr 8, 2021Updated 4 years ago
- Browse the web entirely over SMS — no apps required.☆13Oct 6, 2014Updated 11 years ago
- Ultimate phishing tool with Ngrok integrated.☆17Feb 7, 2018Updated 8 years ago
- How to hack Snapchat account?☆18Mar 30, 2021Updated 4 years ago
- Android application for screen unlock using NFC☆29Oct 15, 2013Updated 12 years ago
- Hasherdotid☆11Jul 10, 2018Updated 7 years ago
- My thesis of me and my friend. Subject for Android security☆14Sep 19, 2019Updated 6 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆19May 29, 2023Updated 2 years ago
- A ultimate customizable lock screen to make your termux more secure.☆12Jan 8, 2024Updated 2 years ago
- Spy the messages from a iDevice with or without passcode.☆18Apr 19, 2022Updated 3 years ago
- FBBrute FBBrute is a Facebook brute force tool, launches an attack by guessing the target password with a set of wordlist provided. so th…☆17Jul 22, 2023Updated 2 years ago
- FLAC (lossless music/audio) downloader for/from TIDAL☆13Nov 5, 2019Updated 6 years ago
- small and simple tool for generating a list and searching for Google Dork to identify leaked files and save the scan result☆14Nov 1, 2023Updated 2 years ago
- Processing PST/EML/MBOX mail archives for Investigative Research☆23May 11, 2024Updated last year
- ☆20Oct 25, 2023Updated 2 years ago
- Cyber Equipment for Carrying out Pentesting and Server Defense from Hacker Attack Activities☆19Oct 16, 2025Updated 4 months ago
- ☆15Jul 23, 2022Updated 3 years ago
- This repo will install popular tool johnTheRipper in your termux☆70Jun 9, 2025Updated 8 months ago
- All the deals for InfoSec related software/tools this Black Friday☆16Nov 25, 2023Updated 2 years ago
- Zphisher is an upgraded form of Shellphish. The main source code is from Shellphish . But I have not fully copied it . I have upgraded it…☆20May 14, 2021Updated 4 years ago
- These are favored by companies who deal with sensitive information to prevent leaks. The 5GHz WiFi jammer is effective up to 40 meters an…☆18May 1, 2021Updated 4 years ago