hamedA2 / Zydra
☆421Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for Zydra
- Tangalanga: the Zoom conference scanner hacking tool☆285Updated 4 years ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆558Updated 6 months ago
- An open source batch script based WiFi Passview for Windows!☆294Updated 6 months ago
- Hacking systems with the automation of PasteJacking attacks.☆387Updated 3 weeks ago
- Sinister is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info☆447Updated last month
- RomBuster is a router exploitation tool that allows to disclosure network router admin password.☆481Updated 3 months ago
- This tool is design to find admin panel of any website by using custom wordlist or default wordlist easily and allow you to find admin pa…☆156Updated 3 years ago
- Websploit is an advanced MITM framework.☆268Updated 7 years ago
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆367Updated last year
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆873Updated last year
- A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs provi…☆621Updated 2 years ago
- Update Version 3.1 added free SMS messaging.☆471Updated 2 years ago
- Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3…☆270Updated 2 years ago
- NekoBot | Auto Exploiter With 500+ Exploit 2000+ Shell☆359Updated 3 years ago
- Framework RapidPayload - Metasploit Payload Generator | Crypter FUD AntiVirus Evasion☆401Updated 3 years ago
- Automated WPA/WPA2 PSK attack tool.☆545Updated 3 years ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆395Updated 9 months ago
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities☆276Updated 3 months ago
- ☆591Updated 8 months ago
- Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).☆607Updated 2 years ago
- ☆951Updated last year
- Kraken: A multi-platform distributed brute-force password cracking system☆299Updated last year
- An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to he…☆227Updated 2 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆495Updated 6 months ago
- Chrome Keylogger Extension | Post Exploitation Tool☆405Updated 2 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆725Updated 4 years ago
- Ransom0 is a open source ransomware made with Python, designed to find and encrypt user data.☆342Updated 5 months ago