Script for encrypting a GNU/Linux filesystem and then destroying the keys
☆12Sep 23, 2018Updated 7 years ago
Alternatives and similar repositories for fsociety
Users that are interested in fsociety are comparing it to the libraries listed below
Sorting:
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆18Mar 30, 2021Updated 4 years ago
- Hack any Instagram account through bruteforce.☆10Sep 24, 2021Updated 4 years ago
- ☆13Oct 17, 2020Updated 5 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆24Nov 18, 2017Updated 8 years ago
- This is is to bruteforce on instagram☆58Jul 2, 2019Updated 6 years ago
- Install Metasploit Framework 6 in Termux☆11Nov 28, 2020Updated 5 years ago
- This utility smart contact can be used to build DAPP which can lock LP Tokens or any BEP20 or ERC20 Tokens (Depends on deployment chain) …☆11Sep 30, 2021Updated 4 years ago
- Memberi Akses root di termux Supaya bisa menjalankan sc root :)☆12May 17, 2020Updated 5 years ago
- ☆11Nov 29, 2018Updated 7 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- AFOS Package Manager☆10May 2, 2021Updated 4 years ago
- ☆20Aug 16, 2019Updated 6 years ago
- A proof-of-stake based crypto currency☆13Mar 6, 2024Updated 2 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆11Mar 2, 2019Updated 7 years ago
- ☆11Jul 5, 2016Updated 9 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- best tool for hacking via windows cmd☆13Jan 4, 2019Updated 7 years ago
- Tumblr reblog bot☆15Apr 11, 2013Updated 12 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- List of useful OSINT tools for information gathering. Especially for pentesters 🖖☆11May 10, 2024Updated last year
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- A phishing tool precisely for instagram with custom login link☆14Sep 3, 2020Updated 5 years ago
- Install and run kali, blackarch, parrot and more... inside the termux udocker container | no root☆14Jul 25, 2025Updated 7 months ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆13Jan 12, 2025Updated last year
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- ☆11Feb 27, 2022Updated 4 years ago
- Documentación sobre sistemas embebidos☆12Nov 15, 2024Updated last year
- A tool written in python for scraping firebase data☆43Apr 5, 2020Updated 5 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- Own linux scripts and configurations☆14Feb 12, 2025Updated last year
- Some scripts for using Tornado Cash from the command line, but written in TypeScript and with fewer crazy dependencies.☆16Feb 21, 2025Updated last year
- Hash Checker Bypass and Process Hacker☆18Nov 14, 2021Updated 4 years ago
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Sep 11, 2025Updated 5 months ago
- Check Your ProxyList Now !!☆10Aug 5, 2020Updated 5 years ago
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- FTP-like interface over S3 to allow auth users (OAuth, SAML) manage files under some buckets and folders, with normal users and admins.☆11Oct 25, 2020Updated 5 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Jan 14, 2021Updated 5 years ago