fancymalware / soundcloud-ripperLinks
Find private tracks on soundcloud by bruteforcing shareable links
☆13Updated last year
Alternatives and similar repositories for soundcloud-ripper
Users that are interested in soundcloud-ripper are comparing it to the libraries listed below
Sorting:
- ☆11Updated last year
- Autofill Phishing☆85Updated 5 months ago
- ☆31Updated 5 years ago
- reupload of oak grabber☆67Updated last year
- poc for CVE-2025-24252 & CVE-2025-24132☆150Updated 3 weeks ago
- Bookmarklet to find endpoints easily with one click☆75Updated last year
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆169Updated 8 months ago
- track, trace, and take down with SCAMTRACK☆29Updated 5 months ago
- Phishing with a fake reCAPTCHA☆636Updated last year
- Matkap - hunt down malicious Telegram bots☆898Updated 5 months ago
- BLE cha0s t00lkit xox☆68Updated last month
- Spearphishing tools, generate masqueraded pocket executable☆107Updated 2 years ago
- capNcook - a dark web exploration tool☆87Updated last year
- A python implementation of doyensec/Session-Hijacking-Visual-Exploitation☆44Updated 2 years ago
- Remake of CVE-2020-9484 by Pentestical☆22Updated last year
- POC | Steal user WhatsApp information/data☆75Updated 8 months ago
- WPair is a defensive security research tool that demonstrates the CVE-2025-36911 (eg WhisperPair) vulnerability in Google's Fast Pair pro…☆565Updated 2 weeks ago
- ☆129Updated last year
- Analyze your tryhackme progress!☆12Updated last year
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆83Updated 10 months ago
- Self-hosted tiny web C2 framework for dynamically managing PowerShell/BashScript payloads and collecting exfiltrated data☆19Updated 8 months ago
- Best Repo for learn DDOS ( Send me Stars ⭐ )☆35Updated 8 months ago
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆165Updated last year
- What the name says....☆104Updated last year
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆95Updated 9 months ago
- Turning smart lights into Wifi Hacking implants.☆179Updated 11 months ago
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆517Updated last year
- RockYou2024 10 billion passwords leaked in the largest compilation of all time☆352Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆41Updated last year
- A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.☆92Updated 8 months ago