hamedA2 / ZydraLinks
☆432Updated last year
Alternatives and similar repositories for Zydra
Users that are interested in Zydra are comparing it to the libraries listed below
Sorting:
- NekoBot | Auto Exploiter With 500+ Exploit 2000+ Shell☆379Updated 4 years ago
- RomBuster is a router exploitation tool that allows to disclosure network router admin password.☆520Updated last year
- Tangalanga: the Zoom conference scanner hacking tool☆289Updated 4 years ago
- Web Service write in Python for control and protect your android device remotely.☆193Updated 2 years ago
- This tool is design to find admin panel of any website by using custom wordlist or default wordlist easily and allow you to find admin pa…☆163Updated 4 years ago
- tor_ip_switcher is useful for making any DoS attack look like a DDoS attack. Works with toriptables2.☆230Updated last month
- Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3…☆318Updated 2 years ago
- A cross-platform python based utility for information gathering and penetration testing automation!☆423Updated last year
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆404Updated last year
- Automated WPA/WPA2 PSK attack tool.☆578Updated 4 years ago
- Tool Information Gathering & social engineering Write By [Python,JS,PHP]☆516Updated last year
- Steganograpy in Python | Hide files or data in Image Files☆171Updated 3 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆122Updated last year
- An open source batch script based WiFi Passview for Windows!☆319Updated last year
- Websploit is an advanced MITM framework.☆301Updated 7 years ago
- An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S0…☆869Updated 10 months ago
- Network, recon and offensive-security tool for Linux.☆309Updated last year
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆932Updated last year
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in C.☆175Updated last year
- Hacking systems with the automation of PasteJacking attacks.☆401Updated 10 months ago
- uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or direc…☆836Updated 3 years ago
- Fast Modular Web Interfaces Bruteforcer☆227Updated 3 years ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆610Updated last year
- A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs provi…☆636Updated 3 years ago
- Update Version 3.1 added free SMS messaging.☆491Updated 3 years ago
- Adds ability to successfully login into websites that have a delay after login and adds directory of chromedriver, this fork was used in …☆153Updated 3 years ago
- scan for webcams on the internet☆262Updated last year
- DMitry (Deepmagic Information Gathering Tool)☆225Updated last year
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆240Updated last year
- Transparent proxy through Tor for Kali Linux OS☆1,150Updated last year