er4vn / i-DetectorView external linksLinks
Educational tool for simulating Instagram login and 2FA mechanisms. Designed for ethical hacking and cybersecurity training.
☆19Jul 29, 2025Updated 6 months ago
Alternatives and similar repositories for i-Detector
Users that are interested in i-Detector are comparing it to the libraries listed below
Sorting:
- WormGPT CLI: Chaos engine for testing LLM workflows.☆37Aug 8, 2025Updated 6 months ago
- Samraksh - IoT Based Women Safety Device! ( Anveshana 2021-2022 Mini Project )☆10Apr 12, 2025Updated 10 months ago
- ⚡ Officially maintained Tenka modules.☆10Updated this week
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 6 months ago
- Tutorials and Things to Do while Hunting Vulnerability.☆13Aug 30, 2022Updated 3 years ago
- Tools Termux Phising By ArdiGans Official🏃☆13Jun 27, 2021Updated 4 years ago
- Provides temporary admin access for a standard user via Jamf Self Service☆10Oct 25, 2023Updated 2 years ago
- A collection of hacks and one-off scripts☆11Apr 6, 2020Updated 5 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Blockchain web page clone - I cloned the blockchain website to combine my html and css information☆10Mar 3, 2023Updated 2 years ago
- After extensive research and understanding of how Pegasus Spyware is operating inside of iOS and AndroidOS systems I have created tools t…☆15Oct 25, 2021Updated 4 years ago
- regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper☆12Jun 8, 2024Updated last year
- Exploit XXE Out-Of-Band Vulnerability Easily☆16Jul 28, 2016Updated 9 years ago
- Linux graphical network connections manager with tomoyo firewall support (based on mihaivzr/netactview)☆17May 11, 2019Updated 6 years ago
- Community driven roadmaps, articles and resources for developers☆54Nov 14, 2019Updated 6 years ago
- miscellaneous sploit scripts/hacks☆18Feb 3, 2025Updated last year
- A collection of awesome penetration testing resources, tools and other shiny things☆12Feb 15, 2021Updated 4 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- TeleStrike is a red team utility designed for adversary simulation and security auditing of Telegram accounts. Built for educational and …☆42Aug 1, 2025Updated 6 months ago
- ☆17Jan 2, 2020Updated 6 years ago
- Red Team Tool Kit☆16Mar 10, 2019Updated 6 years ago
- A tool to get anyone's IP, device details and exact location on google maps along with latitude and longitude by sharing a link with the …☆18May 4, 2020Updated 5 years ago
- SigFramework it's a modified version of SiGploit☆21Jan 19, 2026Updated 3 weeks ago
- #!/usr/bin/python2 #coding=utf-8 #The Credit For This Code Goes To lovehacker #If You Wanna Take Credits For This Code, Please Look Yours…☆29Oct 24, 2021Updated 4 years ago
- A facebook hacking framework made by me to hack facebook account using bruteforcing or phishing and also get auto likes on fb☆23Oct 16, 2025Updated 3 months ago
- This project provides insights into how ransomware operates without the need to install any applications.☆27Sep 23, 2023Updated 2 years ago
- EvilDroid automates the exploitation of CVE-2024-0044, installing malicious payloads on a target device and extracting sensitive data. It…☆24Sep 6, 2025Updated 5 months ago
- USBNinja steals all Wifi SSID's and passwords that a computer has been connected to and sends them to a mail by choice. Works on Windows …☆21Nov 26, 2019Updated 6 years ago
- Upgrading jsleak with a CI/CD and new rules☆16May 6, 2023Updated 2 years ago
- Windows forensics Engine☆54Jan 19, 2026Updated 3 weeks ago
- Craxify Automated Reconnaissance Framework for Bug Bounty Hunters☆19Apr 3, 2025Updated 10 months ago
- Solutions to problems in The BOOK Starting Out With Python By TONY GADDIS.☆25Oct 27, 2020Updated 5 years ago
- A powerful command-line tool for Google dorking, enabling users to uncover hidden information and vulnerabilities with advanced search qu…☆28Jul 10, 2025Updated 7 months ago
- DepthSearch is a deep web OSINT tool that enables powerful, anonymous searches across deep web search engines. It features proxy support,…☆23Oct 26, 2024Updated last year
- Bruteforce attack on facebook account using python script code by Mr.X☆24Oct 16, 2025Updated 3 months ago
- Database of URLs from institutions using proxy servers, like EZproxy.☆28Feb 1, 2026Updated last week
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- A multifunctional Telegram based Android RAT without port forwarding.☆15Jul 27, 2022Updated 3 years ago
- SignAPK for recovery flashable zip signing in Android too.(Only testkey)☆24Mar 28, 2024Updated last year